text
stringlengths
205
677k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
15
2.02k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
47
152k
score
float64
2.52
5.16
int_score
int64
3
5
If you were able to reform the education system in Britain, what form would it take? Use the ideas and theories of philosophers, sociologists and psychologists to support your answer. The question is more difficult and complex then it may at first seem. Reforming the education system relies on a multiple and varied context of philosophical assumptions, sociological analysis, psychological research, political and ideological contestation and pragmatic and practical implementation. Bearing this in mind, the answer will be inevitably partial but will attempt to address the underlying concerns assumed by the question. After a brief introduction outlining some of the issues of stake it will be necessary to provide a summary overview of the education system in Britain, focusing on key reforms, in order to place the answer into a relevant historical context. This includes developments such as The Education Reform Act of 1870, The Butler Education Act of 1944 and more recent Conservative, Labour and Coalition policy documents, which inherit historical conflicts. Drawing on this research, key debates emerge. These include issues of religion versus secularism, education as commodity versus education as process, the reinforcing versus the challenging of social inequalities, funding, diversity and the role of the state. The next section of the essay will focus primarily on questions of inequality and the ‘marketisation’ of the knowledge economy. It will draw on the work of the sociologist Pierre Bourdieu, who argues that education acts as a way of reinforcing existing social inequalities, as well as considering philosophical underpinnings through the Marxist-Lacanian work of Louis Althusser. It will be argued that Bourdieu’s concept of cultural capital is vital to challenging and re-addressing notions of inequality in the education system, but that this can be redefined in a more positive way, as suggested by educational theorists such as Sue Clegg (2011). It will be argued that in order to challenge the neoliberal reduction of education to market value, post-structuralist conceptions of the self in process must be employed in order to consider education as an ongoing process of transformation. This argument draws on Foucault and the philosopher Jacques Ranciere. Finally, it focuses on initiatives already occurring at grassroots level where self-organised educational models are challenging institutional norms and the ingrained assumptions of the neoliberal model. Barrows and Woods (2006, p.11), in their discussion of the philosophy of education, argue that “the first and one of the most important tasks for those who wish to understand and contribute to sound educational policy and practice is to analyse the concept of education; to give an account of the idea; to determine what precisely counts as being well-educated”. Questions of reforming the education system, in other words, must taken into account larger philosophical, sociological and psychological questions of what ‘education’ consists of, what it aims to do and what its place in society should be. Bartlett and Burton (2007, p.11) expand on these ideas to raise the issues of what we mean by education, and why it is seen to be important. It can be considered as a process or as a product, for example, as something to be consumed or as an ongoing interaction. Does it have to be intentional or could it happen in other ways? They go on to propose an overarching definition of education as about gaining “a wider understanding of the world” (p.12). Added to these concerns could also be issues over which power interests are at stake in education. An ideological dimension demands an analysis of which interests are being served in the form, content and definition of education. These will have changed over time, being constantly negotiated, debated and adapted, and will change further in the future as the education system constantly shifts and changes in the wake of competing forces. In order to address the question of reform it is necessary first of all to outline how the education system in Britain has changed throughout history, showing how its practices are contingent, dependent on a variety of actors and social forces and always in a state of tension. Bartlett and Burton (2007, p.62) locate the beginnings of the modern educational system around 1870, specifically with the Education Reform Act of 1870. Before this period, education was rudimentary, most children worked to earn a living although there were institutions such as ‘drill schools’ to improve literacy and numeracy skills necessary for specific work. Changes in the 1870s saw the need for more workers due to the Industrial Revolution. Processes of mass urbanisation, industrial technological development and social change led to a demand for more literate workers. At the same time, changes to the voting system meant that more people needed to be educated to a level to understand what and who they were voting for (Bartlett and Burton, 2007, p.62). This period, then, saw the beginnings of elementary schooling. It also saw challenges over interests in education. There was a class conflict for example as the upper classes feared than an increasingly educated working class mass would organize revolution. There was also conflict between the Church and secular organisations over the role of education. Should it, for example, educate children in the tenets of Christianity, or should it focus on secular subjects, skills and knowledge (Bartlett and Burton, 2007, p.62). As can be seen from a brief historical overview, there have always been tensions over the role of education, which become played out at the level of the day to day delivery of the education system itself. The early 20th Century saw more changes, including the establishing of secondary schools and of Local Education Authorities. Education was seen as important in improving quality of life. (Bartlett and Burton, 2007, p.65). On one hand, social reformers saw it as a potentially radical mechanism for challenging class inequalities in society. On the other hand, however, deep-rooted inequalities remained entrenched in the system. Girls studied ‘housewifery’, for example, illustrating the ideological enforcement of gender roles inherent to educational practice. The Fisher Education Act of 1918 made secondary education compulsory to the age of fourteen, although the system was still split along class lines with working-class children rarely staying on beyond fourteen (Bartlett and Burton, 2007, p.65). This periods also saw the origins of a split between academic and vocational learning, although it was the Butler Education Act of 1944, which is defined by Bartlett and Burton as “the defining moment in the history of modern education” (p.66). Drawing on the philosophy of Plato’s Republic that different people are cut out for different roles in life (cited in Bartlett and Burton, 2007, p.66), a tripartite split emerged between grammar, technical and secondary modern schools. Secondary education was proposed as a right for all, but came to take on different forms for different people. As Stephen Ball (2008, p.68) has argued, this tripartite division has been criticised since its inception. Ball goes on to discuss how ht “neoliberal outlook” (p.77) became increasingly important since the election of Margaret Thatcher in 1979 and the development of Conservative educational assumptions into more recent New Labour and now Coalition Government policies. He defines this neoliberal outlook as being based upon “the twin pillars of individual liberty (the freedom to choose) and market freedom (the discipline of competition)” (p.77). New Labour education policy can be seen as inheriting the legacies of these diverse histories. On one hand, it advocates increasing access to education, a system whereby more and more people are educated. On the other hand, it also ties education strongly to discourses of globalisation arguing that is vital for economic competitiveness in a global market, and that competition between institutions is important. Contemporary Conservative Liberal Democrat Coalition policy focuses on concepts of ‘freedom’ and ‘choice’ (DfE, 2010), characterising previous policy in terms of perceived bureaucracy and offering more possibility for individual interpretation. This historical overview has been necessary in order to reveal some of the fundamental philosophical, sociological and psychological assumptions at stake in education. There is an issue of class interests, for example. Should education allow for the possibility of the redistribution of cultural capital and thus challenge existing social equalities or does it simply reinforce equalities already existing in society. The work of Bourdieu (1984), for example, argues the latter, that the education system is an important site of reproducing social inequality through its naturalised institutional form. It is also possible, however, to criticise this view (Lane, 2000; Davis, 2010, p.10) arguing that there is potential for education to challenge class divisions and distinctions within society. There is also an issue of the opposition between religion and secularism. This was key at the origins of the modern education system and has re-emerged more recently in relation not only to religious discourses but also to debates over cultural diversity. Should education, for example, allow for faith schools, which respect the cultures of migrant communities, or should it enforce a secular education system in which difference and diversity is channeled into a more integrated model? Do gender inequalities still exist and how are these played out at the level of educational outcomes? How should higher education be funded with regard to the contribution made by students, Government and other interests? Should the private sector have more of a role in educational provision? And should ‘free schools’ be a viable alternative to Government-organised models of National Curriculum. These are the key concerns for contemporary education, emerging from a historical context, which must be addressed in a model for reforming the education system. A reference point for addressing these issues and starting to address a holistic concept of reform can come from focusing initially on the first point. Bourdieu provides a vital reference point for a sociological analysis of education. His sociological theory, as outlined by Kaseem et al. (2006, p.176) “aims to develop an understanding of how forms of division, domination and exclusion are historically based and maintained”. He does this through a focus not only on forms of economic capital (material wealth) and social capital (networks) but also on cultural capital – a type of naturalised sense of entitlement that creates distinctions between different groups in society. Much has been written within educational sociology on the relation between cultural capital and educational attitudes. Thomas, Thomas and Quinn’s (2007) study, for example, argues that access to Higher Education is affected fundamentally not by skills, knowledge and grades or by financial issues but by senses of ‘family know-how’ which are passed on by generations who have been to university before and so are familiar with the implicit codes and conventions involved in application procedures. Such studies suggest that any reform of the educational system which attempts to address inequality must tackle not only existing social equalities or identity politics based on, for example, the under-representation of particular ethnic groups within education, but must also focus on more ingrained social attitudes through a thorough re-engagement with Bourdieu’s concept of cultural capital. This would demand not simply an application of Bourdieu’s theories to the education system but an understanding of how studies such as that by Thomas, Thomas and Quinn could be used to rebalance cultural capital demands through redefining concepts of ‘equality’ and ‘access’. While Bourdieu’s analysis suggests the replaying of cultural imbalance, others have attempted a more radical reformist approach to his work. Sue Clegg (2011), for example reformulates Bourdieu’s concepts in order to suggest amore critical concept of cultural capital, which could be used within strategies of reform. Rather than focus on on ‘lack’ of cultural capital, she suggests redefinitions which enable other forms of capital (community links etc..) to be taken into account (p.93). Her analysis is also useful in challenging the role of education as about “personal economic advantage” (p.93). This is an inevitable effect of the marketisation of Higher Education instigated by Thatcherite policy and continued throughout the New Labour years. If students are paying a lot of money for education that it is inevitable than they will see it as a commodifiable product, expecting economic returns on their investment. An alternative to this would be to reframe education in terms of a re-structuring of self, what Clegg (2011, p.94) describes as “the articulation of possible future selves”, therefore emphaissing the value of it as process rather than commodofiable piece of information data for a global market. Such debates draw upon a whole range of philosophical assumptions and problems. They demand an engagement, for example, with post-structuralis notions of the self such as those defined by Foucault (Storey, 1996, p.101), where the self and identity are not fixed but are always in a process of change in relation to surrounding discourses of power. Education provides an important framework for such change, rather than a pre-packaged piece of information to be bought and sold. Bourdieu’s theory relies on an Althusserian (1971) concept of ‘interpellation’ where the education subject (student) is called or hailed into a specific way of thinking and being, and a particular position within a stratified system from within the institutionalised networks of power of which they are part . Education in this way functions as what Althusser defines as an Ideological State Apparatus, providing a framework for the re-affirming of state positions. Althusser’s assumptions, can, however be criticised. They are restrictive and determining for example, suggesting a monolithic conception of power where little to no agency is given to the individual subject to restrict such institutionalisation and normalisation. The model has been criticised, for example, by the philosopher Jacques Ranciere, Ranciere is critical of Bourdieu for the way that his model does not inspire the possibility of change in the education system (Davis, p.10) he instead proposes a different model of education, “while the mobile and composite character of Ranceiere’s narrative makes it difficult to extract a single position on pedagogy…[he tends] to reject reform in favour of a partial or wholesale rejection of institutional education” (Davis, 2010, p.33). It is such rejection that it being brought into consideration through recent developments. While the Coalition policy suggests the possibility of ‘Free Schools’, alternative movements provide their own alternative (Free, 2011) where such assumptions are brought into critical question. It is within the network of this emerging development of self-organised educational practice that the market-driven assumptions underpinning educational theory can gradually become challenged and reform can begin to emerge. A return to Bourdieu and his critique through those such as Ranciere allows for the consideration of a type of reform which draws attention to the fundamental assumptions in the education system and takes its critiques into account. While it is not within the scope of this essay to outline a full new manifesto for education it has suggested problems and directions for reform, where the increasing definition of education as a commodity enabling the individual’s economic advantage can be undermined and challenged. Althusser, L. (1971) ‘Ideology and Ideological State Apparatuses (Notes Toward an Investigation)’, reprinted at http://www.marxists.org/reference/archive/althusser/1970/ideology.htm, [accessed 15/5/2011]. Ball, S.J. (2008) The Education Debate. London: Policy Press. Barrow, R. and Woods, R. (2006) 4th edn. An Introduction to Philosophy of Education, Abingdon: Routledge. Bartlett, S. and Burton, D. (2007) An Introduction to Education Studies, London: Paul Chapman. Bourdieu, P. (1984) Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press. Clegg, S. (2011) ‘Cultural Capital and Agency: Connecting Critique and Curriculum in Higher Education’, British Journal of Sociology of Education, Volume 32, Issue 1, 93-108. Davis, O. (2010) Jacques Ranciere. London: Polity Press. DfE (2010) The Importance of Teaching: The Schools White Paper 2010, presented to Parliament by the Secretary of State for Education, November, 2010. London: National Archives. Free (2011), ‘The Really Free School’, http://freeartlondon.wordpress.com/2011/01/25/opening-tomorrow-seeking-participants-the-really-free-school/ [accessed 15/5/2011]. Kaseem, D. Mufti, E. and Robinson, J. (eds) (2006) Education Studies: Issues and Critical Perspectives, Milton Keynes: Open University Press. Lane, J.F. (2000) Pierre Bourdieu: A Critical Introduction. London: Pluto Press. Palmer, J. A. (2001) Fifty Modern Thinkers in Education: From Piaget to the Present London: Routledge. Storey, J. (2006) Cultural Theory and Popular Culture: An Introduction. London: Pearson. Thomas, L., Thomas, E. and Quinn, J. (2007) First Generation Entry into Higher Education: An International Study. Maidenhead and New York: Open University Press. Ward, L. (2010) Lohn Locke and Modern Life. Cambridge: Cambidge University Press. Ward, S (2004) Education Studies: A Student’s Guide. New York: RoutledgeFalmer. Walford, G. (1998) Durkheim and Modern Education. London: Routledge.
<urn:uuid:79558417-5b41-4c85-b0a2-d6589f2a12e1>
CC-MAIN-2023-50
https://writemyessay.co.uk/free_resource/reform-of-the-education-system-essay-2500-words-pgce/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.944807
3,700
2.703125
3
With just a couple of weeks until Earth Hour, let’s celebrate a commitment to the planet with friends, family, community or at work. One small act of turning off the lights for one hour can bring so much change. This year Earth Hour is all about changing climate change. On March 28, from 8:30 p.m. to 9:30 p.m. let’s bring awareness to climate change and have some fun in the dark too! Here’s nine things we can do when the lights are out: 1. Candle lit dinners Have a picnic indoors or outdoors, depending on the weather. Candles create a lovely ambiance to any meal, so gather some friends and snacks (ahead of time) and enjoy the special time together. WWF-France will be hosting a candle light dinner in front of the Eiffel tower! 2. Host a trivia night Have some climate change trivia with friends. Or if you’re in Toronto, WWF and Bullfrog Power invite you to kick off Earth Hour week with a fun night of trivia! You can meet fellow WWF supporters, talk to renewable energy experts, and show off your environmental smarts. RSVP here for the March 23rd event! Nowadays it’s difficult to find a spot that is not lit up by bright lights- even at night time. That’s why Earth Hour is a special opportunity to view all the stars, even with the naked eye! Take this time to observe all the natural lights in the sky. 4. Play games Playing board games is great when you’re with friends and family, so grab some candles and a game or two and have some fun. You may even forget to turn the lights on because you’re having so much fun! Practice yoga, or do some squats. Being physically active is a great and healthy way to pass the time. 6. Join a community event Many places all over the world are hosting Earth hour events. Check your local community centers or businesses and see if they are having lights out events. This year it has become even easier to find events with the Earth Hour tracker, where you can locate events nearby or even add your own events! Visit the site to search today: Earthhour.org/tracker. 7. Get outside Maybe a famous local landmark is going to be turning the lights off for Earth Hour. This is a great time to walk around and explore places and buildings as you would not normally see them! Earth Hour can be a moment to just spend alone. Maybe it’s reading by a candle, or treating yourself to a homemade facial. We could all use an hour to relax! Lastly, Earth Hour is a great time to reflect. This is a time to be disconnected from technology and have a moment to just talk. Speak with family and friends about climate change, and all the magnificent species being affected like the polar bear. Or come up with ideas for using less energy beyond the hour! Get inspired! Watch the official Earth Hour 2015 video: On March 28 at 8:30 p.m. local time, six continents, 120 countries, and 24 time zones will be united as a global community, making our voices heard through the individual action of turning off the lights. Join in and let’s change climate change. Don’t forget to add your own Earth Hour events to the all-new interactive Earth Hour Tracker.
<urn:uuid:8c2a350c-548c-42c3-9a18-0c3d37b59d2a>
CC-MAIN-2023-50
https://wwf.ca/stories/earth-hour-2015-nine-things-to-do-in-the-dark/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.919337
713
2.765625
3
It always seems that the more work you do in a garden, the more pest and disease problems seem to appear. For this reason, the keen home gardener and the professional landscaper need to be aware about what pests and diseases they may come in contact with, and how to control This Study Guide will help in the identification of these problems. Without correct identification, it would be very difficult to suggest a suitable method of control. For example, a hole in a leaf may indicate damage by a pathogen such as a fungus, bacterium, or virus, or it could be caused by an insect. If you thought the problem was caused by an insect and sprayed it with an insecticide, but it was actually caused by a virus, then the spray is totally wasted. The course will help the home gardener and those working in horticulture at an entry level to identify and control a range of the most common pests and diseases of plants. This course covers six lessons. Lesson 1: Identifying problems - Understanding what can go wrong with your plants - More than one problem - Finding out what the problem is - Conducting an inspection - Alternative approach - Still unsure? - Telltale symptoms - The main types of problems - Shortcuts to problem identification - What insect is it? - Diagnosis of plant disorders - Difficult to diagnose problems Lesson 2: Treating problems - Different ways to control pests and diseases - 1) Cultural control - 2) Biological control - 3) Physical controls - 4) Chemical - 5) Legal control Lesson 3: Problems and the plants they affect - Flowers & bulbs - Fruit & vegetables - Indoor, shade & greenhouse plants - Shrubs & climbers - Australian natives Lesson 4: Pests - The major types of pests - Common garden pests Lesson 5: Diseases - Disease considerations - Types of pathogens - Understanding diseases - Stages in the development of a disease - Common diseases Lesson 6: Environmental problems - Common environmental problems - Foliage burn - Lack of water - Drainage problems - Plant tolerance levels - Ways to protect plants - Protective structures - Tree guards - Wind breaks - Environmental problems in lawns - Spray programmes - Stages of growth - Simple conversions - Further information - Diagnosis services Identifying Plant Diseases and the Correct Treatment Quick methods for assessing plant problems tend to be less technical and include things like: matching the problem to a photograph or description (in a book or on a chart), checking problems common on that plant, and identifying broad groups rather than specific diseases. Before applying the best treatment, one needs to know what is causing the problem/s. It requires a great deal of knowledge and expertise to be able to precisely diagnose plant troubles. Do not expect to develop such ability quickly. The first and perhaps most important skill to develop is how to inspect a plant in order to discover the telltale symptoms which will provide an indication of what is wrong. This process requires practice and careful observation. You will learn the techniques and what is used to treat a variety of diseases. How do our courses work? - This is a self-guided course- you work through the course at your own time. - Enrol any time. Your enrolment will be processed during business hours within a few hours. - After your enrolment has been processed, you will receive an email explaining the course and how to access to the study guide, and our help desk. The guide contains both an audio and written explanation of how the course can be studied. - Follow the study guide, read and undertake different learning tasks to broaden and deepen your understanding of the subject. These tasks can vary from practicals to research and more. You can select to do as many or as little as you like. - If and when you need to; you can contact our academic staff via a help desk. Emails are answered during business hours. - At the end of each lesson, you are presented with a series of automated self assessment questions, to review and reinforce your learning - Once you have completed all of the lessons, you are presented with a major online exam comprising lots of questions. The exam is assessed in our online training system once it has been submitted. If you achieve a result of 60% or more, you are given access to download a “Certificate of Completion” with your name, together with the current date and name of this short course. - Everything is automatic, but if you do need help at any point along your journey of discovery there is a help desk, with real people who have real expertise –only an email away to help you out.
<urn:uuid:d895e134-3ea8-4da6-a475-4306197299af>
CC-MAIN-2023-50
https://www.acseduonline.com/courses/short-courses-online-26/plant-health-sgh5-679.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.925977
1,028
3.46875
3
Karl Lindholm: Satch, Fleet, and Diz: The “Porous” color line Black baseball operated in a segregated world. But the walls of segregation were porous. — Donn Rogosin, “Invisible Men” Editor’s note: This is the latest in a series inspired by the centennial this year of baseball’s Negro Leagues. Baseball, the American version of the British games of cricket and rounders, began in an organized fashion in the United States with actual contests in the 1840s. By the time of the Civil War, “base ball” (two words in those days) was a big deal in the U.S. In the Civil War, both the Union and Confederate armies played the game in their ample downtime. It was a favorite pastime for Black soldiers too: 180,000 freed slaves fought for the North. After the war, these soldiers disseminated the game throughout the country like so many Johnny Appleseeds. In the 1870s and ’80s, Black players competed alongside whites on integrated teams at the highest levels, though not without incident. Bud Fowler is acknowledged to be the first Black professional player. He had a long career, traveling the country from New England to the West Coast, playing on integrated teams, before ending up with the Cuban Giants after the color line was firmly drawn in the late 1880s. Moses Fleetwood “Fleet” Walker, who attended Oberlin College, became the first Black major league player when he took the field for Toledo of the American Association (then a major league) in 1886. The year 1887 was the high point of integrated play in the 19th century with 20 Black players on white professional teams. That year was also the low point, as it was the year the color barrier was erected, the so-called gentleman’s agreement that barred Blacks from organized (white) baseball for the next 60 years. Two years before, as the color line was being drawn, the Cuban Giants, the first all-professional African American team, was formed, enlisting many of the greatest Black players of the day. Those Cuban Giants played in Florida, a hotel team, and then traveled the East Coast, “barnstorming,” playing all comers, day after day, wherever they could arrange games. They even played in Middlebury, Vermont. In all, the Cuban Giants played five games against the Middlebury College boys, the first game in May 1893, and the final game in June 1898. Each game was advertised in giant broadsides (posters), which are saved in the Sheldon Museum’s collection. The first game was a 17-8 Giants’ win, and the subsequent games were likewise one-sided. The Middlebury Undergraduate (school newspaper) reported, “The only pleasing feature was the coaching by the Giants,” such was the obligation to entertain white fans in interracial contests, then and thereafter, even if it meant playing to broad racial stereotypes. In the Giants’ lineup against Middlebury in 1893 and ’94 were two members of the Hall of Fame in Cooperstown: second baseman Frank Grant, considered the best of the 19th-century Black ballplayers; and Sol White, player, manager, and historian, the author of “The History of Colored Baseball” in 1907. Though the Cuban Giants had no Cubans (the thinking was that being “Cuban” would be an advantage in scheduling games in the U.S.), Cuba itself was the winter destination for the best Black and white ballplayers, a beisbol paradiso, from the 1880s to the 1950s and the Castro Revolution. There was racism in Cuba, but of far different quality from that in the United States. There were Black Cubans, descended from African slaves, and white Cubans from Europeans, and many admixtures, who played on the same teams. In the U.S., Black Cubans played in baseball’s Negro Leagues, over 200 of them, and 41 white Spaniards played in the Major Leagues. Martin Dihigo, Jose Mendez, and Cristobal Torriente are Cuban Negro Leaguers in the Hall of Fame in Cooperstown. In baseball’s winter offseason, both white and Black American players went to Cuba to play, often on integrated teams. White professional baseball players, Major Leaguers, knew well the skills of their black contemporaries. Interracial games were a popular feature of American culture for as long as the game was segregated. After the formation of the Negro Leagues, white players played against whites, and Blacks largely against Blacks, in their leagues during the summer. In the off-season, however, interracial and integrated play was commonplace. While the game was segregated at the highest level — Major League teams and their minor league subsidiaries, at other levels, and outside of organized baseball, as Rogosin put it, the “walls were porous.” Nobody in the game, outside of ownership — neither white players and certainly not Black players — was making sufficient money to take the “offseason” off. So after the World Series in the fall, white and Black stars collaborated on exhibition, or “special attraction,” games. In the 1930s, the Satchel Paige All-Stars and the Dizzy Dean All-Stars played a number of these games before big crowds. They were kindred spirits, Diz from Arkansas and Satch from Alabama. Satch was already a legend in Black baseball and Diz was Major League baseball’s best pitcher. If I could travel back in time to just one game, I would choose the contest between Satch and his Black minions, and Diz and his club of white stars in November 1934, before 18,000 fans at Wrigley Field in Los Angeles, a 1-0 thirteen-inning victory for Satch’s Giants: Satch struck out 17, Diz 15. Diz said of Satch: “If Satchel Paige and I were pitching on the same team, we would clinch the pennant by July Fourth and go fishing until World Series time.” In the 1940s, Satch was still the reigning ace of Black baseball. In October 1946, Major League great Bob Feller organized an ambitious barnstorming series between Satch’s all-stars and Feller’s. The two teams traveled in their own airplanes (DC-3s) and played 34 games in 27 days, visiting 32 cities in 17 states, from New York to Los Angeles, 13,000 miles, for more than 250,000 fans. Baseball historian John Holway extensively researched Black/white games, contests between Negro Leaguers and Major Leaguers during segregation. He found box scores of 167 games: the Black stars won two-thirds. Negro League baseball, Black baseball generally, is sometimes called an “Atlantis,” a hidden baseball world. Not that hidden. The Middlebury College men’s basketball team dropped a pair of home games to teams in the … (read more) The Middlebury College women’s basketball team split a pair of games this past weekend at … (read more)
<urn:uuid:f1b8a4fc-8331-490c-b4a3-af4bad565fd8>
CC-MAIN-2023-50
https://www.addisonindependent.com/2020/10/29/karl-lindholm-satch-fleet-and-diz-the-porous-color-line/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.979303
1,523
3
3
Everything You Need to Know About Antisemitism Antisemitism is a tangible threat to Jews and the very fabric of democratic societies. American Jewish Committee (AJC), with a global presence, works every day to combat Jew-hatred through global diplomacy, political advocacy, coalition building, and strategic communications. The resources below include key insights on antisemitism including the connection between antisemitism and anti-Zionism, antisemitism from the far-right, the far-left, and in the name of Islam. It also includes explanations of philosemitism, the Working Definition of Antisemitism, white supremacists, Holocaust distortion, conspiracy theories, and more. To find answers to your questions about antisemitism use the search bar below and check boxes on the left to view articles, videos, podcasts, columns, eBooks, and more. Don’t see an answer to your question about antisemitism? Click here to let us know. - AJC Task Force to Implement the U.S. National Strategy - AJC's Call to Action Against Antisemitism - Antisemitism in Europe - The Working Definition of Antisemitism - Resources on Holocaust Denial, Distortion, and Trivialization - State of Antisemitism Around the Globe - Translate Hate - A Roadmap for America - Forms of Antisemitism Based on results from AJC’s State of Antisemitism in America 2022 report, these videos goes beyond the numbers to highlight the rapidly changing and challenging reality for America Jews navigating everyday life with antisemitism, and thoughtful reflections from Jewish allies and friends on the need for unity to fight this hate. - AJC’s State of Antisemitism in America 2022 Video Series - 10 Tough Questions on Antisemitism Explained - 12 Essential and Timely Resources on Antisemitism For American Jews and Allies of the Jewish Community - Understanding the Origins of Antisemitism - The Mainstreaming of Antisemitism: How Should We Respond? - Global Trends in Conspiracy Theories Linking Jews with Coronavirus - Anti-Zionism as a Form of Antisemitism
<urn:uuid:e9761ca3-d3ca-4ecb-b782-2c9147f002c8>
CC-MAIN-2023-50
https://www.ajc.org/resources/antisemitism?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.838409
468
2.75
3
ARCHERS have disagreed violently concerning the weight of arrows, arrowheads, and feathers. Some have maintained that for a bow of twenty rotls an arrow of three dirhams should be had, and for a bow of thirty rotls an arrow of four dirhams. For every increase often rotls in the weight of the bow a corresponding increase of one dirham should be introduced into the weight of the arrow. Others have said that the weight of the arrow should never be less than seven dirhams and never more than twenty dirhams no matter how stiff or how flexible the bow may be. If the bow is a flexible one and less than eighty rotls in weight, its arrow should be of seven dirhams, that is: six dirhams less one third of a dirham for the weight of the wood, one dirham for the weight of the arrowhead, and one third of a dirham for the weight of the glue and feathers. If a bow is eighty rotls in weight, its arrow should weigh ten dirhams: eight and one half dirhams for the wood, and one and a half dirhams for the arrowhead, feathers, and glue. For bows above a hundred rotls in weight, the arrow should weigh from sixteen to twenty dirhams—never beyond that if you wish to insure accuracy and speed. Ṭāhir al-Balkhi related, on the authority of his grandfather, Shāapūur dhu-’l-Aktāf [literally: Shāapūur of the shoulders; Shāapūur II, A.D. 310-379], that the weight of the arrow of a stiff bow should be twelve dirhams, ten of which belong to the shaft and two to the arrowhead and feathers. With such an arrow the kings of Persia were wont to shoot. They boasted of shooting light arrows with stiff bows. Ṭāhir said that, if the bow were thirty rotls in weight, the arrow should be eight and one third dirhams and the range one hundred cubits; if the bow were forty rotls in weight, the arrow should be the same—eight and one third dirhams—and the range one hundred and twentyfive cubits; if the bow were fifty rotls, the arrow should be the same—eight and one third dirhams-and the range one hundred and fifty cubits; if the bow were sixty rotls in weight, the arrow should be ten dirhams and the range one hundred and seventy cubits; likewise, if the bow were ninety rotls and the range two hundred cubits, the arrow should be ten dirhams; if the bow were one hundred rotls, the arrow should be from twelve to sixteen dirhams and the range from two hundred and seventy cubits to three hundred cubits. The weight of the arrow should not go beyond this and the range cannot be increased. Some archers have maintained that target arrows should weigh from twelve to sixteen dirhams; never more for those who desire accuracy and speed. War arrows, however, should weigh from fifteen to twenty dirhams. This is, indeed, what we have tried and found good. The war arrow should have a large and wide metal arrowhead. Experts avoid using heavy arrows because of their many flaws and blemishes and because of their ineffectiveness. They would rather use light arrows with stiff bows as the arrows then travel straight without wobbling. Others have said that arrows suitable for target shooting should be heavy and have abundant feathers. I, myself, used to shoot at the target with an arrow weighing over twenty dirhams. It has been said that thin and fine arrows are suitable for distant targets and for enemies who are far away. Near targets, trick shooting and stunts, as well as small minute targets, require heavy arrows that are round in shape [cylindrical] and weigh about fifteen dirhams. Every archer should test himself with both varieties, the heavy and the light. In short, light arrows give greater penetration and longer range while heavy ones insure greater accuracy. For every kind of shooting, however, there is a particular weight of arrow. The arrowhead, according to some archers, should weigh one seventh of the arrow, while the feathers should weigh one seventh of the arrowhead. Others have held that the arrowhead should weigh one eighth of the arrow and the feathers one eighth of the arrowhead. Still others have maintained that the arrowhead should equal one ninth of the arrow and the feathers one ninth of the arrowhead. If, therefore, the weight of the arrow were seven dirhams, the weight of the wood would be six dirhams less one seventh of a dirham, the arrowhead would be one dirham, and the feathers one seventh of a dirham. When the second ratio prevails, the wood will be six dirhams and one eighth of a dirham, the arrowhead seven eighths of a dirham, and the feathers seven eighths of one eighth of a dirham. When the third ratio is followed, the wood will be six dirhams and one ninth of a dirham and one ninth of one ninth of a dirham, the arrowhead seven ninths of a dirham, and the feathers seven ninths of one ninth of a dirham. The dirham used here is the so-called dirham of weight (dirham al-kayl). It is equivalent to fifty grains and two fifths of a grain of barley of medium size. Every eleven and one ninth dirhams of this legal weight make one uqīyah. In terms of our large dirhams which are current in Morocco in the two-dirham unit, the legal dirham of weight is equivalent to three dirhams and one eighth of a dirham, approximately. The reason for calling this dirham the dirham of weight (dirham al-kayl) is because it is the basis of the rotl (which equals twelve uqīyahs), the mudd (which equals six and one third rotls), and the ṣā’ (which equals twenty-six and two thirds rotls). It is the legal dirham of Islam. It was described by abu-Muhammad ibn-‘Aṭīyah in his treatise on weights and measures (al-Makāyīl w-al-Awzaā).
<urn:uuid:2af3620b-1b30-4443-b3ac-a419e79cd744>
CC-MAIN-2023-50
https://www.archerylibrary.com/books/faris-elmer/arab-archery/docs/xl.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.952098
1,344
3.109375
3
The phrase “in addition” is used to indicate the inclusion of something else or an increase in something. It suggests that something is being added to an existing situation and can also be used to introduce an extra item, point, factor, or idea to a list, statement, or argument, which may further enhance the meaning of the previous information. Another word for in addition is also or too. However, more synonyms will be stated in the following article. “In addition” – General synonyms Synonyms of the phrase in addition will be listed below. - Along with - As well as - For good measure - Into the bargain - On top of - Over and above - Then as well - To boot - To say nothing of - What’s more “In addition” – Synonyms used in academic writing In academic writing, “in addition” is a commonly used phrase to add further information to a statement, argument, or discussion. It is often used to introduce new evidence, examples, or perspectives that support or expand upon a previously mentioned point. Synonyms for in addition that can be used for an academic piece of writing include additionally, furthermore, and moreover. Are you looking for suitable synonyms for “in addition” for your academic paper? Have a look at the table below with the top suggestions from our BachelorPrint-Team. |“In Addition” Synonyms||Examples| |Additionally||In addition, the authors of the study note that further research is needed.| |Additionally, the authors of the study note that further research is needed.| |Furthermore||In addition, the research proves that social media impacts mental health.| |Furthermore, the research proves that social media impacts mental health.| |Moreover||In addition, the results of the study indicate significant improvements in health.| |Moreover, the results of the study indicate significant improvements in health.|
<urn:uuid:3ee40db5-7128-4b16-ba69-2f53f8a4797a>
CC-MAIN-2023-50
https://www.bachelorprint.au/synonyms/in-addition-synonyms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.906552
416
3.5
4
Clean Air Victory: Power Plants Can't Fix Pollution by Paving Roads In an important victory for common sense and clean air, the Center for Biological Diversity has won a lawsuit striking down a California policy saying that coal-fired power plants can keep polluting the air as long as they pave some county roads. That's right, the Mojave Desert Air Quality Management District decided in 2007 that power plants and other industrial polluters can continue to spew mercury, nitrogen oxides, sulfur oxides, fly ash, and other toxins as long as they reduce dust pollution by paving nearby dirt roads. It gets worse: The district avoided having to explain its bizarre logic by illegally exempting its decision from the state's main environmental and land-use law, the California Environmental Quality Act. The Center -- and now the courts -- objected, striking down the decision unless and until its adverse impacts on the environment and human health are revealed to the public through a full environmental review. Peruse our press release and learn more about our work to uphold the California Environmental Quality Act. Goshawk Listed as Endangered Species (Sort of) The Center's 14-year campaign to protect the old-growth-dependent goshawk from logging reached a milestone this week, when the U.S. Fish and Wildlife Service formally proposed to list the Queen Charlotte goshawk as an endangered species in Canada. The rainforest bird has declined dramatically as ancient forests have been clearcut in coastal British Columbia. The bad news is the Queen Charlotte goshawk also lives in Alaska's Tongass National Forest, where it is similarly declining due to American-style clearcutting. By excluding the Alaska population from protective status, the Fish and Wildlife Service is giving a green light to the destruction of America's premier rainforest. The worse news is that the Obama administration used a controversial Bush policy to shore up its sleight-of-hand trick. Where's the change, Obama? Check out our press release and learn more about the Queen Charlotte goshawk. California Hauled Back to Court for American Pika Refusing to stand by while the American pika suffers due to climate change, this Wednesday the Center for Biological Diversity, represented by Earthjustice, brought California back to court to demand the species be considered for state protection. Although the science clearly shows the pika is in great danger due to global warming, the California Fish and Game Commission has now twice denied the Center's petition for pika protection -- and we've now twice sued. Pikas, small rabbit relatives living in California's high mountains, are cold adapted and can die when exposed to 78-degree Fahrenheit temperatures for just hours. Climate change is also altering their habitat, hindering feeding and shelter. Thanks to Center work, the pika is already on its way to federal Endangered Species Act protection. Check out our press release and learn more about the American pika. Arizona Species Defended From Brainless ORV Planning To protect one of the Southwest's most important wetlands from off-road vehicle destruction, last Friday the Center for Biological Diversity and Sky Island Alliance warned the feds not to let a computer program determine the fate of Arizona's Gila Box Riparian National Conservation Area. The Bureau of Land Management's new plan to manage off-road vehicle routes in the area uses a computer program called the Route Evaluation Tree. Unfortunately, it's unclear whether the program -- which employs yes-or-no questions to decide on maintaining current vehicle routes and opening new ones -- asks questions like, "Does this route run through endangered species habitat?" or "Is this route damaging a stream?" The Gila Box plan threatens protected species including the Gila chub, southwestern willow flycatcher, and Chiricahua leopard frog. A recent Center-won lawsuit shows that the Bureau used a similar computer program in the California desert and illegally failed to minimize off-road vehicle damage. Says the Center's Cyndi Tuell, "We want the feds to use the best available science in travel-management planning -- not a computer program that doesn't care about the environment." Check out our press release and learn more about travel-management planning. NRA Attacks Center Campaign to Save Condors Just weeks after filing court papers to intervene in the Center for Biological Diversity's lawsuit to stop the shooting of wolves, the National Rifle Association is trying to stop the Center's lawsuit to save condors from being painfully killed by lead poisoning. The Center has sued the Bureau of Land Management to ban the use of lead bullets in condor habitat around the Grand Canyon. Since lead-free bullets are readily available, there is simply no reason to expose condors (or any other animal for that matter) to lethal levels of lead poisoning. Simple, right? Not according to the NRA, which thinks it has a God-given right to spew lead into our public lands and waters regardless of how many species (including humans) it poisons. Learn more about California condors and our campaign to get the lead out of their habitat. Take Action: Save Florida Panther From Oil Drilling If you thought the Florida Everglades' Big Cypress National Wildlife Preserve was safe from destruction, you'd unfortunately be wrong. Though it was saved in the '70s from becoming an international "jetport" -- and turned into a preserve, where endangered Florida panthers roam -- more than 23,000 acres of the preserve are still owned by Miami-Dade County, and commissioners have been considering whether to allow oil drilling there to fund the expansion of the Miami International Airport. Thanks to public outcry, Miami's mayor pulled the oil-drilling idea from the table at this week's county commission meeting. But the issue isn't dead, and we need to keep the pressure on Miami-Dade to make sure the county knows we won't let Big Cypress become an oil field. The Center for Biological Diversity recently filed a scientific petition to protect 3.4 million acres of Florida panther habitat -- including Big Cypress land -- this September; in the same month, we sued to expand habitat protections for the critically endangered Cape Sable seaside sparrow, which also depends on the preserve for survival. Now, we're asking you to sign our petition to Miami's mayor to ensure there's no drilling in Big Cypress -- now or ever. Then read more in the Miami Herald. River Otters Reintroduced to Rio Grande With the help of New Mexico Friends of River Otters -- a broad collaboration including the Center for Biological Diversity -- six spunky river otters were just released into New Mexico's Rio Pueblo de Taos, near its confluence with the Rio Grande. A mother and her two yearlings were among the most recent otters to join the 10 reintroduced to the Upper Rio Grande last fall. All 16 otters are participants in a decade-long effort to restore the lively mammals into their native habitat in the Upper Rio Grande and the Gila River. The Southwest's native Sonoran river otter was driven extinct by hunters and water pumping, severely disrupting the balance of our desert river ecosystem. As a top-level predator, river otters influence the entire food chain of river systems. The reintroduced otters were caught in Washington state, flown into New Mexico by plane, and released on Taos Pueblo land. Otter releases will continue this fall into the Rio Grande -- and next fall into the Gila River -- until a self-sustaining population of these buoyant, sociable animals has been established. Read more in the New York Times. Save Coal River Mountain From Dirty Coal What could be worse than blasting the top off an ancient mountain to get at dirty coal? How about if it's the highest peak ever to lose its top for mountaintop-removal coal mining and only 200 yards from a coal slurry dam holding 8 billion gallons of toxic sludge above a community? Coal River Mountain was the only intact mountain left in Coal River Valley, West Virginia, and coal giant Massey Energy has already begun blasting it away. Massey plans to annihilate 6,600 acres of forest and fill in 18 streams with toxic mining waste for the project. Take action today to ask the White House and EPA to intervene and save Coal River Mountain. Then read more in the Charleston Gazette. Extinction Crisis Ad in Production -- Thanks to Your Help With thanks to support from our members, the Center has just wrapped up our film shoot for the soon-to-be-released television PSA that will inform the public about the frightening realities of the extinction crisis. Right now we're in the sixth wave of extinctions in the past half-billion years, and it's the biggest problem life on Earth has faced since the loss of the dinosaurs. We now go into editing and production, but couldn't wait to share some previews and spread awareness about the countless animals and plants we could lose if we don't act now to curb habitat destruction, pollution, global warming, consumption, and overpopulation. So check out our slideshow, then read about the IUCN's latest list of species threatened with extinction in the Independent. A Race Against Time for Predators: Listen to Biodiversity Briefing Now The Center for Biological Diversity is famous for our devotion to all imperiled species, from the charismatic polar bear to the little-known Peck's cave amphipod. But saving predators is a key part of our work because of their tremendous role in ecosystem health. Unfortunately, all top-level predators throughout the lower 48 are either extinct, gone from large areas, or surviving at such low numbers they can't fulfill their proper ecological function. And the Obama administration has not been helping. In the latest of the Center's quarterly "Biodiversity Briefing" series, Executive Director Kierán Suckling talks about predator ecology and our recent work for predators across the country, from our petition to protect 3.4 million acres of habitat for the Florida panther to our work to help restore and recover jaguars in the United States to the ongoing battle to protect gray wolves -- and keep them protected -- in the northern Rockies, Midwest, and Southwest. As Suckling says: "If we're even hoping to restore not just wildlife species but ecosystems to health, were going to have to get back the predators. . . . We've got a lot of work ahead of us." To find out more, listen to a clip of the briefing. For information on how you can join the Center's Leadership Circle and be invited to participate in Biodiversity Briefings live when they happen, email Development Director Jennifer Shepherd or call her at (520) 396-1135. Photo credits: Queen Charlotte goshawk by Craig Flatten; coal-fired power plant courtesy Wikimedia Commons/Adilettante; Queen Charlotte goshawk by Craig Flatten; American pika (c) Larry Master/MasterImages.org; southwestern willow flycatcher by Rick and Nora Bowers; California condor juvenile courtesy USFWS; Florida panther courtesy USFWS; river otters courtesy Wikimedia Commons/Dimitry Avovtsev under the Creative Commons attribution license; Brushy Fork slurry impoundment by Vivian Stockman, flight courtesy Southwings; jaguar courtesy Wikimedia Commons/Cburnett under the GNU free documentation license; gray wolf by John and Karen Hollingsworth, USFWS. This message was sent to . The Center for Biological Diversity sends newsletters and action alerts through DemocracyinAction.org. Let us know if you'd like to change your email list preferences or stop receiving action alerts and newsletters from us. Change your address or review your profile here.
<urn:uuid:6efb43c7-5296-4b03-9df4-298ca770285b>
CC-MAIN-2023-50
https://www.biologicaldiversity.org/publications/earthonline/endangered-earth-online-no485.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.926275
2,407
2.875
3
Blockchain technology has taken the world by storm and has become one of the most talked-about innovations in recent years. However, the concept of blockchain can be complex, and it can be challenging to understand the technical details that make it work. In this post, we will take a beginner-friendly approach to understanding the basics of blockchain technology, specifically looking at the fundamental components of blockchain technology: blocks, hashes, nodes and networks. Blocks in Blockchain A block in blockchain is the basic unit of data in a blockchain. It contains a set of transactions that are grouped together and added to the blockchain. Each block in the chain contains a reference to the previous block, forming a secure and unbreakable chain. This is what makes the blockchain so secure, as any alteration to a previous block would require altering all the blocks that come after it. For example, imagine a blockchain for a cryptocurrency, like Bitcoin. Each block in the Bitcoin blockchain contains a set of transactions that have taken place on the network. These transactions could include things like sending or receiving Bitcoin, or creating new Bitcoins through the process of mining. Each block also contains a reference to the previous block in the chain, ensuring that the blockchain is secure and tamper-proof. To make it simple, each block can be considered as a page in a ledger book, in which transactions are recorded, and once a page is filled, it is added to the chain, and a new page is created. Hash in Blockchain In blockchain, a hash is a digital fingerprint of the data in a block. It is a fixed-length string of characters that is created using a mathematical algorithm. The algorithm takes the data in the block as input, and outputs a unique hash that represents that data. This hash is then added to the block and becomes part of the blockchain. For example, let's say that a block in a blockchain contains the following data: "Transaction 1: Alice sent 5 BTC to Bob. Transaction 2: Charlie sent 2 BTC to David." A hash function, for example, SHA-256, will take the data in the block and convert it into a unique hash. It could look like this: "5f3c3d3d7c5f3c3d3d7c5f3c3d3d7c5f3c3d3d7c5f3c3d3d7c5f3c3d3d7c5f" This hash is then added to the block and becomes part of the blockchain. If any data in the block is altered, the hash will change, making it easy to detect any tampering with the data. Hashes play a critical role in the security of blockchain technology. By comparing the hash of a block with the data it contains, it is possible to ensure that the block has not been tampered with. This ensures the integrity of the blockchain and ensures that all the data is accurate and secure. In summary, a hash is a digital fingerprint of the data in a block, it's used to ensure the integrity and security of the blockchain, by making it easy to detect any tampering with the data in the block. Nodes in Blockchain In a blockchain, a node is a computer that is connected to the blockchain network and participates in the maintenance and operation of the blockchain. Each node keeps a copy of the blockchain and helps to validate and add new blocks to the chain. These nodes work together to maintain the integrity of the blockchain and ensure that all the data is accurate and secure. For example, let's say that a group of people want to create a blockchain for a new cryptocurrency. They would need to set up a network of computers, each of which would act as a node on the blockchain. One node might be responsible for validating new transactions and adding them to the blockchain, while another might be responsible for maintaining a copy of the blockchain and ensuring that it is up-to-date. In a public blockchain, any computer can be a node, while in a private blockchain, the nodes are typically owned and operated by a single organization. In public blockchain, nodes have the ability to validate and add new blocks to the chain and also have a copy of the blockchain, but they are not controlled by any single entity, while in private blockchain, nodes are controlled by an organization, they validate and add new blocks but they have restricted access to the blockchain. In summary, nodes are the computers that make up the blockchain network, they help to validate and add new blocks to the chain and maintain the integrity of the blockchain by ensuring all the data is accurate and secure. They can be either public or private, depending on the blockchain network. Network in Blockchain A network in blockchain refers to the group of computers or nodes that are connected to the blockchain and participate in its operation and maintenance. These nodes work together to validate transactions, add new blocks to the chain, and ensure the integrity of the blockchain. For example, the Bitcoin network is a decentralized network of nodes that work together to validate and record transactions on the Bitcoin blockchain. Each node on the network has a copy of the entire blockchain and helps to validate new transactions by solving complex mathematical problems. Once a node solves a problem, it can add the new block of transactions to the blockchain, and the other nodes on the network will verify the block before adding it to their own copies of the blockchain. Another example could be a private blockchain network, which is used by an organization to track their supply chain, the network would be composed of nodes that are owned by the organization and the access to the network is restricted. These nodes would validate transactions, and add new blocks of data to the chain, ensuring that all the data is accurate and secure. In summary, a network in blockchain refers to the group of computers or nodes that are connected to the blockchain, that validate transactions, add new blocks to the chain and ensure the integrity of the blockchain. The network can be either public or private depending on the blockchain. In conclusion, blocks, hashes, nodes and networks are the fundamental components of blockchain technology. Together, they form the backbone of the blockchain and make it such a secure and reliable system. With the potential to revolutionize industries such as finance, healthcare, and logistics, blockchain technology is a technology to watch in the coming years.
<urn:uuid:c02a6ee2-5509-49d9-b0fd-f923d431b02e>
CC-MAIN-2023-50
https://www.blockchainlawyer.in/post/the-abcs-of-blockchain-an-explanation-of-blocks-hashes-and-nodes
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.934556
1,301
3.703125
4
Psychology is the scientific and social study of human behaviour. The aim is to help us answer the questions – ‘What causes our individual behaviours?’ and ‘How does this behaviour impact society?’ Throughout the course, you will explore behaviour through the lens of significant historical and contemporary psychological case studies across the following core areas of psychology: You will also have the opportunity to plan and conduct your own small scale research projects in your exploration of how psychological investigations are conducted. Due to the discipline’s scientific nature, there will also be the need to engage mathematical skills when analysing the significance of data from research. The subject is challenging and will require you to use a variety of skills to engage successfully. The course is divided into 3 key areas, each with a written examination. 2 hour written examination (30%) You will be planning, conducting, analysing and reporting psychological research across a range of experimental and non-experimental methodologies and techniques. This will give students the opportunity to learn how to apply psychology research in action. 2 hour written examination (35%) Students build knowledge and understanding of 20 psychology studies, demonstrating evaluation skills and an appreciation of wider psychological approaches/perspectives, theories, issues and debates. Students make comparisons and distinctions between Core studies (a classical study and a contemporary one) and examine the broader context of general debates within psychology. Students will also be assessed on the practical applications of psychology. Students will review psychology of the everyday (in newspapers, magazines, TV programmes etc. ) and apply key theories from a novel source. 2 hour written examination (35%) Students will cover one compulsory unit (Issues in Mental Health) and 2 further subjects (Criminal Psychology and Child Psychology). Issues covered will include; the historical context of diagnosis, what makes us mad? And characteristics of mental health disorders such as Schizophrenia and Phobias. Furthermore, students will review the key debates in psychology such as the effect of nature v nurture, do humans truly have free will or is our behaviour determined by other forces? There are 3 examinations at A level. There is an expectation that students will pre-prepare for lessons with students required to work more independently, with guidance being given by teachers about what should be covered in addition to lesson content to consolidate learning. For example, students will be expected to read full articles of the studies covered (located on MS Teams) rather than simply rely on text book summaries. Studying psychology enables students to think critically, analyse and evaluate. The course will therefore provide an excellent grounding in preparation for higher education and an awareness of how to apply psychology to everyday life. As such an A level in psychology provides an excellent background for careers in the legal profession, police force, medicine, teaching, management, advertising and marketing. The Blue Coat Sixth Form is proud to be part of the Cranmer Education Trust Cranmer Education Trust is a company limited by guarantee and an exempt charity registered in England. Company registration number: 07687709. Registered Office: Cranmer Education Trust, c/o The Blue Coat School, Egerton Street, Oldham OL1 3SQ. The website address is www.cranmereducationtrust.com and the phone number 0161 785 5082.
<urn:uuid:fcd43815-2411-49fb-8c4c-adc539021246>
CC-MAIN-2023-50
https://www.bluecoatsixthform.org/courses/psychology/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.921073
680
3.609375
4
Copyright© Thomas Köhler/photothek.net Political situation Internal political tensions In the years leading up to 2018, far-reaching corruption scandals and poor economic development caused a surge in discontent among the population. The presidential elections in 2018 were won by Jair Bolsonaro, whose focus in the election campaign was on fighting corruption and crime, and on boosting the economy. During Bolsonaro's presidency, internal political tensions emerged in Brazil. Among other things, the protection and demarcation of indigenous territories, which are enshrined in the country's constitution, was increasingly called into question; legal requirements for environmental protection and forest conservation were eased in favour of advancing the economic development of the Amazon region. The judiciary played a crucial role in safeguarding democratic freedoms and in ensuring compliance with existing laws. Presidential elections were held again in October 2022. In the run-off election, Luiz Inácio Lula da Silva, who had been president before, defeated incumbent president Bolsonaro, winning 50.9 per cent of the vote. Now Lula da Silva is facing the difficult task of restoring social peace within a divided society. Challenges include the economic and social consequences of the COVID-19 pandemic and of the war against Ukraine as well as reforms that are needed in areas such as environmental protection and climate action, and taxation. The level of violence in Brazil and the country's homicide rate are among the highest in the world. For many people, especially in the megacities of Rio de Janeiro and São Paulo, drug and gang crime is part of everyday life. Human rights organisations regularly report evidence of police killings. They also say that environmental activists and defenders of human rights and land rights are frequently the targets of attacks, threats and intimidation attempts by government authorities and criminal networks. As at: 19/01/2023
<urn:uuid:0f2d34c6-b16f-4606-b4a1-b0cea63a7260>
CC-MAIN-2023-50
https://www.bmz.de/en/countries/brazil/political-situation-49028
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.970431
379
3.046875
3
Advanced Cancer That Progresses During Treatment Treatment for advanced breast cancer can often shrink the cancer or slow its growth , but after a time, it tends to stop working. Further treatment options at this point depend on several factors, including previous treatments, where the cancer is located, a woman’s menopause status, general health, desire to continue getting treatment, and whether the hormone receptor status and HER2 status have changed on the cancer cells. What Is Breast Cancer Breast cancer originates in your breast tissue. It occurs when breast cells mutate and grow out of control, creating a mass of tissue . Like other cancers, breast cancer can invade and grow into the tissue surrounding your breast. It can also travel to other parts of your body and form new tumors. When this happens, its called metastasis. Additional Tools For Diagnosing Advanced Breast Cancer The additional tools below are often used specifically for diagnosing advanced cancer: Sentinel lymph node biopsy: This procedure removes sentinel lymph node cells during surgery for examination. When breast cancer spreads, it often heads first to the lymph nodes. Chest X-ray: This detailed image of the chest may help doctors see whether cancer has spread to the bones. Computed tomography scan: Also known as a CAT scan, this procedure takes detailed pictures of internal areas of the body using a computer linked to an X-ray machine. A dye may be used to help the organs show up more clearly in the images. Bone scan: This procedure looks for bone metastasis, or cancer cells that have spread to the bone. A small amount of radioactive material is injected into the blood, then detected with a scanner. Positron emission tomography scan: A PET scan is a detailed imaging tool that uses a radioactive drug, known as a tracer, to search for cancer cells within your body. Don’t Miss: Can Breast Cancer Cause Fluid In The Lungs How Do You Treat Stage 4 Breast Cancer - an oral chemo drug called capecitabine for 18 to 24 weeks. This might help some women live longer. - more pembrolizumab after surgery to reduce the chances of the cancer coming back. - the targeted drug olaparib for one year for women who have a BRCA mutation to help lower the chance of the cancer recurring. Metastatic Or Stage 4 Breast Cancer Survival Rate The five-year survival rate for metastatic breast cancer patients depend on how far the cancer has spread: - Regional metastatic breast cancer: The five-year relative survival rate is 86 percent . - Distant metastatic breast cancer: The five-year relative survival rate is 29 percent. Breast cancer treatment: The care you need is one call away Your multidisciplinary team will work with you to develop a personalized plan to treat your breast cancer in a way that fits your individual needs and goals. Don’t Miss: Is Breast Cancer Hard Or Soft Lump Can Metastatic Breast Cancer Go Into Remission Metastatic breast cancer may never go away completely. But treatment can control its spread. Cancer may even go into remission at some points. This means you have fewer signs and symptoms of cancer. A treatment break may be considered in certain situations, including if remission occurs or if someone is experiencing intolerable side effects. A pause in treatment can help you feel your best and improve your quality of life. Does Breast Cancer Stop Working Treatment for advanced breast cancer can often shrink the cancer or slow its growth , but after a time, it tends to stop working. Further treatment options at this point depend on several factors, including previous treatments, where the cancer is located, and a womans age, general health, and desire to continue getting treatment. Also Check: Can Breast Cancer Spread During Chemo How Can I Be Sure That My Cancer Will Be Detected Before It Has Spread While you cant prevent breast cancer altogether, there are certain things you can do to reduce your risk of discovering it at an advanced stage. For example: - Get routine mammograms. The American Cancer Society recommends having a baseline mammogram at age 35, and a screening mammogram every year after age 40. - Examine your breasts every month after age 20. Youll become familiar with the contours and feel of your breasts and will be more alert to changes. - Have your breasts examined by a healthcare provider at least once every three years after age 20, and every year after age 40. Clinical breast exams can detect lumps that mammograms may not find. Treatment Options For Metastatic Breast Cancer Treatment for metastatic breast cancer often is based on systemic therapies, which use drugs rather than surgery or radiation. Metastases treatments are designed to shrink tumors and slow their growth, help ease symptoms and improve quality of life. Treatment may change, such as when one therapy stops working, or the side effects become too uncomfortable. Rather than having only one treatment, most patients undergo several treatments combined to help fight the cancer. The four broad categories of drug-based treatments are: You May Like: What Age Do People Get Breast Cancer Will I Need More Than One Treatment For Metastatic Breast Cancer Medications are important for metastatic breast cancer to help control its spread. Resistance to therapies may develop, which can lead your care team to recommend a change in treatment. When you start a treatment regimen, you and your care team will see how: - The cancer responds to the therapy. - The side effects impact you. If the treatment isnt working or the side effects are unbearable, your care team can discuss switching the treatment method. They may recommend a different drug, dosage or schedule. There are many treatments available. If one therapy isnt working for you for whatever reason, there is usually another one you can try. How Is Metastatic Breast Cancer Diagnosed If you have symptoms of metastatic breast cancer, your provider may recommend tests including: - Blood tests, including complete blood count and comprehensive metabolic panel. - Imaging studies, including MRI, CT, bone scan and PET. - Bronchoscopy, which uses a scope to look inside your lungs this can be done if there is a concerning spot in the lungs. - Biopsy to remove tissue from a suspicious area and analyze it. - A tap to remove fluid from an area with symptoms. For example, pleural tap removes fluid from the lung area. Spinal tap removes fluid from the spinal cord area. You May Like: What Breast Cancer Feels Like What Should I Ask My Healthcare Provider About Metastatic Breast Cancer If youve been diagnosed with metastatic breast cancer, ask your provider: - What are my treatment options? - What is my prognosis? - What side effects can I expect? - Will complementary therapy help me feel better? - What if I want to stop treatment? - How can I feel my best during treatment? A note from Cleveland Clinic Metastatic breast cancer is advanced breast cancer. Providers classify it as stage 4 breast cancer. It happens when cancer cells, often left behind after previous breast cancer treatment, start to spread to other parts of the body. While there is no cure for metastatic breast cancer, treatment can prolong your life and help you feel better. There are many medications available, so if one treatment isnt working, your care team can try a different approach. If you notice any symptoms or dont feel your best, especially if youve undergone breast cancer treatment in the past, talk to your healthcare provider. Last reviewed by a Cleveland Clinic medical professional on 04/14/2021. What Is A Normal Breast No breast is typical. What is normal for you may not be normal for another woman. Most women say their breasts feel lumpy or uneven. The way your breasts look and feel can be affected by getting your period, having children, losing or gaining weight, and taking certain medications. Breasts also tend to change as you age. For more information, see the National Cancer Institutes Breast Changes and Conditions.external icon Recommended Reading: What Does Stage 2 Breast Cancer Mean What Hormones Are Used For Cancer For hormone receptor-positive cancers that were being treated with hormone therapy, switching to another type of hormone therapy sometimes helps. For example, if either letrozole or anastrozole were given, using exemestane, possibly with everolimus , may be an option. Another option might be using fulvestrant or an aromatase inhibitor , along with a CDK inhibitor. If the cancer has a PIK3CA mutation and has grown while on an aromatase inhibitor, fulvestrant with alpelisib might be considered. If the cancer is no longer responding to any hormone drugs, chemotherapy is usually the next step. Progression During Hormone Therapy For hormone receptor-positive cancers that were being treated with hormone therapy, switching to another type of hormone therapy sometimes helps. For example, if either letrozole or anastrozole were given, using exemestane, possibly with everolimus , may be an option. Another option might be using fulvestrant or a different aromatase inhibitor, along with a CDK inhibitor. If the cancer has a PIK3CA mutation and has grown while being treated with an aromatase inhibitor, fulvestrant with alpelisib might be considered. If the cancer is no longer responding to any hormone drugs, chemotherapy immunotherapy, or PARP inhibitors might be options depending on specific features of the cancer or any gene changes that might be present. You May Like: How Do People Get Breast Cancer Treatments For Stage 4 Breast Cancer The following are treatment options for ductal carcinoma and lobular carcinoma. Your healthcare team will suggest treatments based on your needs and work with you to develop a treatment plan. Stage 4 means that the breast cancer has spread to other parts of the body. It is also called advanced breast cancer, or metastatic breast cancer. Treatments cannot completely cure metastatic breast cancer, but they can control it very well, sometimes for many years. Doctors may offer one treatment until it stops working and then give another one. The treatments offered for stage 4 breast cancer depend on the hormone-receptor status and the HER2 status of the cancer cells. They will also depend on where the cancer has spread, if it is causing any symptoms and your overall health. What Can I Expect While Living With Metastatic Breast Cancer Your care team will monitor you every few months to check if the cancer is responding to treatment, and also to see if you are having any side effects. The process of restaging the cancer includes: - History/physical exam. - Imaging tests, including CTs and bone scan or PET scan. Before your scans or tests, its normal to feel anxiety. It may help to bring a friend or family member to the appointment with you. Read Also: What Is Breast Cancer Disease What Are The Risk Factors Several factors can increase a mans chance of getting breast cancer. Having risk factors does not mean you will get breast cancer. - Getting older. The risk for breast cancer increases with age. Most breast cancers are found after age 50. - Genetic mutations. Inherited changes in certain genes, such as BRCA1 and BRCA2, increase breast cancer risk. - Family history of breast cancer. A mans risk for breast cancer is higher if a close family member has had breast cancer. - Radiation therapy treatment. Men who had radiation therapy to the chest have a higher risk of getting breast cancer. - Hormone therapy treatment. Drugs containing estrogen , which were used to treat prostate cancer in the past, increase mens breast cancer risk. - Klinefelter syndrome.Klinefelter syndrome is a rare genetic condition in which a male has an extra X chromosome. This can lead to the body making higher levels of estrogen and lower levels of androgens . - Certain conditions that affect the testicles. Injury to, swelling in, or surgery to remove the testicles can increase breast cancer risk. - Liver disease. Cirrhosis of the liver can lower androgen levels and raise estrogen levels in men, increasing the risk of breast cancer. - Overweight and obesity. Older men who are overweight or have obesity have a higher risk of getting breast cancer than men at a normal weight. The Role Of Caregivers Caregivers also play a vital role in helping a person with cancer be as comfortable as possible. To help, a caregiver can: According to the American Society for Clinical Oncology, in 2018, doctors will diagnose invasive breast cancer in an estimated 268,670 people in the United States. The ACS state that the 5-year relative survival rate for people with metastatic breast cancer is around 22 percent. This means that people with metastatic breast cancer are 22 percent as likely as people without the condition to live at least 5 years following diagnosis. However, many factors can affect how long a person with metastatic breast cancer lives for, including: - the type of breast cancer - the stage of breast cancer - where the cancer has spread to - how well the cancer responds to treatment - any other health issues that the person has Everyoneâs outlook is different. It is also important to note that survivals rates are just estimates, and that doctors base these figures on data from at least 5 years ago. Continuing advancements in cancer treatments means that survival rates are improving. Recommended Reading: Can You Lose Hair From Breast Cancer Stomach Upset Loss Of Appetite And Weight Loss It can be more difficult to eat a healthy diet as these symptoms occur, setting up a vicious cycle. As women avoid certain foods because of stomach upset, the digestive system may lack the fiber and nutrients it needs to function optimally. Over time, women may lose their appetite and have difficulty taking in the calories they need. Not eating regularly may cause significant weight loss and nutritional imbalances. What Does Stage 4 Mean If a person has stage 4 breast cancer, this means that the cancer cells have spread to other organs in their body, such as the lungs, lymph nodes, bones, skin, liver, or brain. Cancer stages range from 1 to 4 and indicate the extent of the disease. A doctor may also refer to stage 4 as advanced or metastatic breast cancer. You May Like: Do Cell Phones Cause Breast Cancer How Is The Stage Determined The staging system most often used for breast cancer is the American Joint Committee on Cancer TNM system. The most recent AJCC system, effective January 2018, has both clinical and pathologic staging systems for breast cancer: - The pathologic stage is determined by examining tissue removed during an operation. - Sometimes, if surgery is not possible right away or at all, the cancer will be given a clinical stage instead. This is based on the results of a physical exam, biopsy, and imaging tests. The clinical stage is used to help plan treatment. Sometimes, though, the cancer has spread further than the clinical stage estimates, and may not predict the patients outlook as accurately as a pathologic stage. In both staging systems, 7 key pieces of information are used: - The extent of the tumor : How large is the cancer? Has it grown into nearby areas? - The spread to nearby lymph nodes : Has the cancer spread to nearby lymph nodes? If so, how many? - The spread to distant sites : Has the cancer spread to distant organs such as the lungs or liver? - Estrogen Receptor status: Does the cancer have the protein called an estrogen receptor? - Progesterone Receptor status: Does the cancer have the protein called a progesterone receptor? - HER2 status: Does the cancer make too much of a protein called HER2? - Grade of the cancer : How much do the cancer cells look like normal cells? In addition, Oncotype Dx® Recurrence Score results may also be considered in the stage in certain situations. How Can I Take Care Of Myself While Living With Metastatic Breast Cancer Living with metastatic breast cancer can be challenging. Your care team can help provide physical and emotional support. Talk to them about how you can: - Eat the most nutritious diet for your needs. - Exercise regularly. - Get emotional support, including finding support groups. - Reach out for help from friends, family and loved ones. - Find mental health services. - Find complementary therapies. How Long Do You Live With Stage 4 Breast Cancer The 5-year relative survival rate for stage 4 breast cancer is 22 percent, which means that 22 percent of people will live for at least 5 years after diagnosis. However, many factors influence survival rates, including: the subtype of breast cancer. how fast the tumor is growing. how likely the cancer is to come back. What Is Metastatic Breast Cancer Metastatic breast cancer is the most advanced stage of breast cancer. Breast cancer develops when abnormal cells in the breast start to divide uncontrollably. A tumor is a mass or collection of these abnormal cells. Metastasis refers to cancer cells that have spread to a new area of the body. In metastatic breast cancer, cells may spread to the: Healthcare providers name cancer based on its primary origin. That means breast cancer that spreads to other body parts is still considered breast cancer. The cancer cells are still breast cancer cells. Your care team will use breast cancer therapies, even if the cancer cells are in other areas. You May Like: How Often Is Radiation Treatment For Breast Cancer
<urn:uuid:1a8b7bc2-4391-4b9b-9c84-2e1f516a0dd0>
CC-MAIN-2023-50
https://www.breastcancertalk.net/stage-4-breast-cancer-symptoms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.932168
3,678
3
3
Chinese Cross-Border Trade Rules on Gold Chinese cross-border trade in gold refers to gold imported into, or exported from China. This gold trade can be in one of two forms of trade, General Trade or Processing Trade. At a high level, “General Trade” refers to the importation of goods by Chinese entities which are sourced from international markets, and the exportation of goods from China which are sent into international markets. “Processing Trade” refers to the importation of raw materials or intermediate goods (components or parts) into China which are then processed in some way before being re-exported. The fabricating (value-add) activities of processing trade are predominantly undertaken within Chinese Free Trade Zones (FTZs). Applied to gold, General Trade refers to gold imported into the Chinese domestic gold market. Processing Trade refers to gold imported into China (mainly into Free Trade Zones) for use in assembly or manufacture, after which the gold-laden finished goods are again exported. Chinese gold imports are either classified as general gold trade (imported from international markets) or processing gold trade (imported, processed and then re-exported) China’s gold trade rules are drafted by the People’s Bank of China (PBoC) and the General Administration of Customs (GAC), and policed by the PBoC. To import gold into China, a gold importer requires a license from the PBoC. Four foreign banks and nine Chinese banks currently holds these gold import licenses. The PBoC is now trialling a scheme whereby an import permit can cover multiple import shipments of gold as opposed to one shipment Chinese gold miners, such as Zijin Mining, can now independently import gold directly into China Chinese Rules on Gold Imports and Exports The official rules on China’s cross-border gold trade are jointly formulated by the People’s Bank of China (PBoC) and the General Administration of Customs (GAC). These rules are issued in a document titled “Measures for the Import and Export of Gold and Gold Products” and are written in the form of 28 Articles. Although the ‘Measures’ are jointly formulated by PBoC and GAC, the PBoC is solely responsible for enforcing and monitoring these cross-border gold trade rules. In theory, the Measures cover gold exports, but since exports of gold from China are generally prohibited under General Trade, the rules in practice predominantly apply to gold imports. China’s cross-border trade rules apply to both Standard gold and non-Standard gold. Standard gold is gold bullion in bar or ingot form in weights of 50 grams, 100 grams, 1 kilogram, 3 kilograms or 12.5 kilograms, and having a gold fineness of 9999, 9995, 999 or 995. All Standard gold imported into the Chinese domestic gold (via through General Trade) is required to be sold in the first instance through a spot gold exchange. In practice, this is the Shanghai Gold Exchange (SGE). The ‘Measures’ state that: “Gold to be imported … shall be registered at a spot gold exchange approved by the State Council where the first trade shall be completed.” Non-standard gold covers such items as gold doré bars, gold ore, gold jewellery / ornaments and gold coins. When imported into the Chinese domestic gold market under General Trade, non-standard gold is not allowed to be sold through the SGE. Importing Gold – Authorisation and Licensing Only entities granted an Import and Export License for Gold and Gold Products can import gold into the Chinese domestic gold market, and only the PBoC can issue such a license. The ‘Measures’ state that: “For the import and export customs clearance of gold and gold products as included in the Catalogue for the Regulation of the Import and Export of Gold and Gold Products, the Import and Export License of the People’s Bank of China for Gold and Gold Products issued by the People’s Bank of China or a People’s Bank of China branch shall be submitted to the Customs.” A PBoC gold import and export licence form records such attributes as importer name, consignee, intended use of the gold, export country, weight of gold in consignment, purity of gold, and pure gold content. Import shipments also have to be accompanied by a corresponding license. The ‘Catalogue for the Regulation of the Import and Export of Gold and Gold Products’ refers to a list of 11 forms of gold by HS Code (trade code) covered by the Catalogue. This list, which includes HS code 71081200 (non-monetary unforged gold), covers fine gold bar imports, as well as diverse other types of gold such as gold scrap, gold powder, and gold jewellery. In practice, only financial institutions are granted licences to import Standard Gold into China. The ‘Measures’ state that: “An applicant for the import and export of gold … shall have corporate status, … it is a financial institution member or a market maker on a gold exchange approved by the State Council.” Currently, 13 financial institutions are approved by the PBoC to hold a gold import license. Four of these are foreign banks, the other nine are Chinese banks: 4 ‘Foreign’ Banks: - HSBC Bank (China) Ltd - Australian and New Zealand Bank (China) Company Ltd - Standard Chartered Bank (China) Ltd - United Overseas Bank (UOB) 9 ‘Local’ Banks: - Industrial and Commercial Bank of China (ICBC) - China Construction Bank (CCB) - Bank of China - Agricultural Bank of China - Bank of Shanghai - China Minsheng Bank (CMB) - Industrial Bank - Shenzhen Development Bank (SDB) / Ping An Bank Note that up until late 2016, the PBoC had approved 15 banks to hold gold import licenses. This included an additional 3 Chinese banks, namely, Bank of Communications (BoCom), Shanghai Pudong Development Bank, and China Merchants. Singapore headquartered bank, United Overseas Bank (UOB) is a recent addition to the foreign bank approved list. Up until mid-2016, banks importing gold into China had to apply for an import quota and then apply for a permit for every import shipment of gold. This rule was referred to as “one batch one License”, with the “Measures” stating that: “There shall be one Import and Export License of the People’s Bank of China for Gold and Gold Products for each batch of product and the License shall be used within 40 work days since the issuing date.” In May 2016, the PBoC and GAC announced that they would trial an amended procedure beginning 1 June 2016 whereby each importing bank could use one permit for up to gold 12 shipments. In September 2015, Zijin Mining, one of China’s largest gold mining companies, became the first domestic company (other than a financial institution) to be approved by the PBoC to import gold into China. Given the trend of international mine acquisitions by Chinese gold mining companies, this rule change by the PBoC suggests that the Chinese authorities want to encourage companies such as Zijin, China National Gold Group and Shandong Gold Group to apply for import gold import license so as to encourage them to import some of the gold production from their foreign mine locations. References and Links 1.^ “The Official Chinese Gold Trade Rules By The PBOC”, BullionStar https://www.bullionstar.com/blogs/koos-jansen/the-official-chinese-gold-trade-rules-by-the-pboc 2.^ “Measures for the Import and Export of Gold and Gold Products”, People’s Bank of China, General Administration of Customs, 1 April 2015, http://lawinfochina.com/display.aspx?id=19292&lib=law 3.^ Import and Export License of the People’s Bank of China for Gold and Gold Products https://static.bullionstar.com/blogs/uploads/2015/11/Import-and-Export-License-of-the-Peoples-Bank-of-China-for-Gold-and-Gold-Products.-Annex-1.pdf 4.^ The Catalogue of Managed Imports and Exports-Gold and Gold Products. English version in Page 2 and 3 of the pdf https://static.bullionstar.com/blogs/uploads/2015/10/The-Catalogue-of-Managed-Imports-and-Exports-Gold-and-Gold-Products-by-HS-code.pdf 5.^ “China Plans to Streamline Procedures for Cross-Border Gold Trade”, Bloomberg News, 4 May 2016 https://www.bloomberg.com/news/articles/2016-05-04/china-plans-to-streamline-procedures-for-cross-border-gold-trade 6.^ “China eases gold trade rules in 6 cities”, Shanghai Daily, 5 May 2016 http://www.shanghaidaily.com/business/energy/China-eases-gold-trade-rules-in-6-cities/shdaily.shtml 7.^ “Hong Kong to gain as China streamlines cross-border gold trade”, South China Morning Post, 4 May 2016 http://www.scmp.com/business/money/investment-products/article/1941353/hong-kong-gain-china-streamlines-cross-border 9.^ “China eyes Obor Gold Rush as it seeks to build reserves”, Asia Times, 16 June 2017 http://www.atimes.com/article/china-eyes-obor-gold-rush-seeks-build-reserves/ Subscribe to Gold University Articles Copyright Information: BullionStar permits you to copy and publicize articles or information from the BullionStar Gold University provided that a link to the article's URL or to https://bullionstar.com is included in your introduction of the article or blog post together with the name BullionStar. The link must be target="_blank" without re="nofollow". All other rights are reserved. BullionStar reserves the right to withdraw the permission to copy content for any or all websites at any time.
<urn:uuid:7c4ae868-7242-49ff-8a13-a8a4ff2b339b>
CC-MAIN-2023-50
https://www.bullionstar.co.nz/gold-university/chinese-cross-border-trade-rules-gold
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.909038
2,242
2.53125
3
Students will read the background information about Geographic Information Systems and Global Positions Systems. Discuss the following question: What ways do farmers use GPS? If possible, bring a GPS receiving unit into the classroom, and discuss other applications of this technology with students. Students can view where they live from space by experimenting with different Earth Observing Systems that are available on various Web sites. Since this is rapidly evolving technology, students can search for additional current resources on the WWW using the following search terms: (global position* system*) or gps (geographic* information* system*) or gis (satellite* with (image* or survey* or data or map* or photograph* )) ((precision) NEAR (farming* or agriculture*)) About NASA'S EOS The Earth Observing System (EOS) consists of a science component and a data system supporting a coordinated series of polar-orbiting and low inclination satellites for long-term global observations of the land surface, biosphere, solid Earth, atmosphere, and oceans. NASA Global Change Master Directory Includes links to how global change is affecting agriculture. A searchable site designed by NASA that includes images, visualizations, and animations of the Earth. View Above Earth This site provides images of any place on the earth. If you know the latitude and longitude of a location, then you can view it. View from Satellite To view the Earth as currently seen from a satellite in Earth orbit, choose the satellite from a list and press the "View Earth from Satellite" button. Teacher Page: NASA's Earth Observing System Includes educational links and publications from the EOS program, Ask an Earth Scientist section, and explanations of terminology used. The EOS Education Project utilizes emerging technologies such as map, image, and document services to delivery geospatial and multimedia information directly into the classroom. An Introduction to Remote Sensing GIS/GPS NASA Lesson Plans Using GPS for Math, Science & Social Studies Discussion group for educators who are integrating the use of GPS and mapping technology into their state curriculums for math, science and social studies. Classroom Applications of GPS and GIS Includes links to GPS WebQuests and projects and GPS/GIS lesson plans. Viewing Earth from Space Showcases NASA's educational products, websites and missions that highlight various images of Earth. Included is a listing of missions that research Earth's various attributes - land, water, air/atmosphere - as well as a list of multimedia resources available through the Center of Resources for Educators (CORE).
<urn:uuid:83149da6-dd77-4dbc-82e2-d469c7e29a52>
CC-MAIN-2023-50
https://www.campsilos.org/farming-today-and-tomorrow/teachers/farm-tech-trek-lesson-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.84436
546
4.34375
4
Here is a link to the medium term planning for Autumn 2. We enjoyed our visit to the local library in Carnforth last week. We chose our own books and enjoyed a story read by Stephen the librarian :) As part of our Science learning this half term, properties and changes of materials, we tested different materials to see which one would be the best for keeping a lunch box cool. We did this by putting an ice cube in each beaker with the material and recording the temperature every five minutes for twenty minutes. We were surprised by the outcomes... As part of Anti-Bullying week, we read the story Dot and were inspired to draw our own dots. We were so pleased with how our dots turned out... Our cookies ensure you get the best experience on our website. Please make your choice! Some cookies are necessary in order to make this website function correctly. These are set by default and whilst you can block or delete them by changing your browser settings, some functionality such as being able to log in to the website will not work if you do this. The necessary cookies set on this website are as follows: A 'sessionid' token is required for logging in to the website and a 'crfstoken' token is used to prevent cross site request forgery. An 'alertDismissed' token is used to prevent certain alerts from re-appearing if they have An 'awsUploads' object is used to facilitate file uploads. to improve the website performance by capturing information such as browser and device types. The data from this cookie is anonymised. Cookies are used to help distinguish between humans and bots on contact forms on this A cookie is used to store your cookie preferences for this website. Cookies that are not necessary to make the website work, but which enable additional functionality, can also be set. By default these cookies are disabled, but you can choose to enable them below:
<urn:uuid:44731aa6-2820-40eb-b960-5f5548b06d97>
CC-MAIN-2023-50
https://www.carnforthprimary.lancs.sch.uk/autumn-2-3/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.942586
410
2.640625
3
The recent cold snap has meant more stove owners are lighting up to keep warm, and with just over two weeks until Christmas, many are doing so to get into the festive spirit. There is something very special about burning wood as you sit, relaxing by the Christmas tree. As nice as this may be, if you burn wood, it’s important to be aware of the regulations around using wood-burning stoves. You can be fined if you do not follow the correct legislation around burning solid fuels. Councils can issue on-the-spot fines ranging from £175 to £300. You can also be taken to court if you repeatedly break these rules. The risks of burning incorrect fuel: While manufacturers have invested significant R&D time and cost into making their stoves highly efficient, if you burn the incorrect fuel, you will be creating unnecessary pollution. You will also be adding congestion in your flue, which will increase the risks of chimney fires and carbon monoxide poisoning. These regulations are designed to protect you and the environment. There is no excuse not to be aware of what you can and can’t burn on your stove. As a stove owner, it is your responsibility to make sure you stay inside the law. Since January 2022, all new stoves sold must be Ecodesign compliant – all the stoves in the Charlton & Jenrick range have been Ecodesign compliant for a number of years before this date. If you purchased a stove before 2022, then the Ecodesign regulations do not apply to you. You still, however, need to make sure you burn the correct type of fuel. The diagram below shows just how efficient an Ecodesign stove is. Most large towns and cities in the UK have smoke control areas. A smoke control area is an area where people or businesses must not: 1. Emit a substantial amount of smoke from a chimney 2. Buy or sell unauthorised fuel for use in a smoke control area unless it’s used in an exempt appliance (appliances which are approved for use in smoke control areas) In these areas, you must either burn smokeless fuel, such as anthracite coal or use a DEFRA-exempt stove, such as those found in the Charlton & Jenrick range. In England, since the summer of 2023, it is illegal to burn coal (anthracite is fine) or wet wood in your home. You can only burn kiln-dried logs, dried logs, including ones which you have seasoned yourself, or smokeless fuels. The confusing conversation around the banning of wood-burning stoves: The government are not considering banning wood-burning stoves. Despite some misinformation in some media sources stating otherwise. Wild claims such as stoves are 750 times more polluting than a HGV and similar is sadly based on inaccurate data, which, for the most part, is seriously flawed. These inaccurate claims create sensational headlines and sadly mislead consumers. The fact is wood-burning stoves are if used correctly, incredibly environmentally friendly. Learn more about our wood-burning stoves here.
<urn:uuid:f5e39aa1-311d-4b2e-b72b-244c9f4aafcf>
CC-MAIN-2023-50
https://www.charltonandjenrick.co.uk/news/2023/12/wood-burning-stove-regulations/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.94124
644
2.578125
3
The Benefits of an Indoor Playground An indoor playground is a great way to keep kids active and engaged, especially in colder climates. It also teaches them the importance of organized activities and social interaction. These spaces are more contained than outside, making it easier for supervisors to keep an eye on children and keep them from getting too close to bigger kids who could unintentionally hurt them. Indoor playgrounds allow kids to run around, climb and swing without being impeded by the weather. In places with snow and cold temperatures, this can be a valuable way to encourage more physical activity in children. In addition, most indoor play structures are contained spaces, making it easier for supervisors to keep an eye on children and make sure they don’t wander off. Collaborating with others on the playground offers kids the chance to develop their social skills. Working together to complete a task requires communication, reading verbal and non-verbal cues, listening and compromise. It can also help children develop patience and the ability to take turns. Playground equipment like spring riders that accommodate more than one child can help children learn how to work together and share. A child’s ability to meet and interact with other kids indoor play centre can be improved by role-playing how they might introduce themselves on the playground. Parents and teachers can also discuss how to play with peers and make friends using age-appropriate methods. Families often choose to visit indoor playgrounds as a way to spend time together, so they can enjoy the experience more than once. This can help families build a relationship with the facility, and it can also provide an alternative to other family activities such as movies and bowling alleys. A kids indoor playground offers plenty of opportunities for physical activity. Kids can run, jump, climb, swing and slide as much as they want. They can also use their imaginations to engage in imaginative scenarios with friends or alone. This type of play is essential to children’s health, as it helps them burn off excess energy. In addition, it promotes coordination, creativity and problem-solving skills. It also helps them learn and develop their social skills. Indoor playgrounds also offer many safety features that can protect kids while they play. For example, they may have padded matting for toddlers and carefully rounded corners on all surfaces. The equipment in a commercial indoor playground is often newer than outdoor playgrounds, and it’s designed to meet strict safety standards. It’s important for kids to be physically active in order to grow and develop properly. However, with so many kids spending most of their time glued to screens and eating unhealthy processed foods, it’s no wonder that childhood obesity is on the rise. If you’re thinking about opening an indoor playground, you’ll need to obtain several business licenses for the state where you plan to operate. The two basic requirements are a DBA (doing business as) license and a general business license. These licenses typically cost less than $50. You’ll also need to secure a zoning permit and insurance. Children learn more efficiently when they have time to use their imagination. Pretend play gives new meaning to objects, locations and people and teaches kids how to create their own stories. Imaginative play also helps them practice their social skills and language development. Indoor playgrounds offer a safe and secure indoor play centre environment for children to explore their imaginations. These spaces are a great alternative to video games and television that encourage creativity, physical activity, and social interaction. These play areas are perfect for parents who don’t want their children spending all day in front of a screen and need to find a fun way to get them out of the house. Imagination opportunities at an indoor playground can include creating a city, a firehouse, or an animal hospital. Children can drive a truck or a car and pretend to work on construction projects or race horses. This type of play promotes healthy motor skills, builds strength, and improves coordination. Another way to encourage imaginative play at an indoor playground is to install custom-designed themed play equipment. You can choose hand-sculpted, textured characters to attract children and inspire their creativity. Theme-based play elements can be added to an outdoor playground as well. Using these elements to build structures and develop new games encourages creativity and problem-solving skills. This creative play has been cited as a tactile teaching tool, creativity-enhancer and teamwork motivator. Indoor playgrounds offer safe opportunities for children to move around in a contained space, and they can be supervised more closely than they would be outside. In addition, the equipment is softer than outdoors and more likely to prevent serious injury. Children can learn social skills while playing in an indoor playground, and they can also practice cooperation. This will help them get along with others in the future and be more effective when working with others. Additionally, organized group activities in an indoor playground can teach children how to work together and take turns. Ensure that the playground is clean and free of hazards. Check for rust, sharp edges, loose or broken parts, and any other potential hazards. Make sure the facility is well ventilated to reduce airborne germs. Sanitize the equipment daily with kid-safe and eco-friendly disinfectants that have been verified to kill up to 99.9% of germs on surfaces. Ensure that the play structure is properly staffed, with at least one staff member to act as a flex monitor to become available for supervision when needed. Positioning staff to have good sight lines into all areas of the facility is important, as are the ability to control the numbers of children who use the playground at any given time. This will reduce the possibility of overcrowding and unauthorized access by adults who are not associated with the business.
<urn:uuid:d0217a0a-0e97-4c35-8c94-94a25ecb558e>
CC-MAIN-2023-50
https://www.chesapekesci.com/the-benefits-of-an-indoor-playground/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.961535
1,195
2.59375
3
Patrick gives advice on why dogs get alopecia May 14, 2023 Alopecia is the partial or complete lack of hairs in areas where they are normally present. It can be worrying to see your dog losing hair, but the underlying cause can be successfully treated. Common causes of alopecia in dogs include: - Ectoparasites – most commonly mange mites, fleas, lice, mosquitos, flies and spider bites - Hair follicle inflammation - Allergic reactions to bites, food or contact with a foreign body - Bacterial or viral skin infections - Anxiety related to self-trauma - Endocrine diseases such as hypothyroidism, hyperadrenocorticism and flank alopecia - Vitamin deficiencies due to an unbalanced diet - Genetic and autoimmune disorders - Environmental (dirty, hot, humid conditions) - Vaccines, chemical exposure or burns If you are unsure about what could be causing alopecia in your dog, do contact our 28 Clarendon Street practice on 01223 359021. Diagnosis and treatment of alopecia in dogs To diagnose alopecia in dogs, our vets will try to identify the root of the problem. They do this by gathering a history, observing the site of hair loss, and looking out for a waxy/greasy feel to the skin as well as a yeasty smell. They will then perform one or more diagnostic tests such as a skin scrape, bacterial culture, or blood test to confirm the underlying cause of the alopecia. Due to the plethora of causes of alopecia, there is also a wide variety of treatments. Some treatments include antifungals, antibiotics, medicated shampoos, sprays or ointments, anti-parasiticides, anti-histamines, diet or environment changes and surgical removal. It’s important that you get a veterinary diagnosis for your dog’s hair loss and follow their treatment advice as not applying the correct products for the cause may not help or could make the condition worse. Get in touch to book an appointment with one of the vets in Cambridge. Recovery and management Once the cause of the alopecia has been identified and the treatment has been administered, your dog will most likely recover successfully. To help maintain your dog’s health, avoid known allergens in the environment if this is the cause and keep them up to date with parasite control and grooming. If your dog begins to develop alopecia again, do contact our veterinary team for help and advice.
<urn:uuid:eb47d101-3bb4-469c-8a9a-0a8a49605aad>
CC-MAIN-2023-50
https://www.clarendonstreetvets.co.uk/article/patrick-gives-advice-on-why-dogs-get-alopecia/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.929341
549
2.890625
3
Chemistry professor Erika Plettner gestures towards beehives surrounded by tall, dry grasses as she explains the multiple pressures facing honeybees worldwide. Pesticides, pathogens and the effects of climate change are putting bees and their role as pollinators of the world’s food crops in peril, she says. So Plettner and her team of researchers are working towards mitigating one tiny yet deadly risk factor — the varroa mite. The team at Simon Fraser University in British Columbia’s Lower Mainland is testing a chemical compound that appears to kill the mites without harming the bees, in hopes it could one day be widely available as a treatment for infested hives. Varroa mites kill bees by puncturing their cuticle, or exoskeleton, creating a wound that doesn’t close, Plettner said. That leaves an opening for disease and weakens bees’ immune systems, she said in an interview at the researchers’ experimental apiary outside Surrey, B.C. “That’s what then ultimately makes (the bees) collapse during wintering,” she said. Plettner and her team are testing the safety and efficacy of the compound identified in her lab some years ago, which appears to paralyze and then kill the mites. The bees involved in the experiment fly in and out of their hives as Plettner explains that the researchers don’t yet understand exactly how the compound works. “We don’t know the actual protein in the mite to which the compound binds, or a collection of proteins. We know that paralysis usually involves the nervous system of the mite,” she said. Her team recently obtained funding from Genome British Columbia, a non-profit organization, to work with researchers at the University of British Columbia to investigate how the compound affects the mites, she added. The researchers place a sheet of sticky paper beneath the hives to collect the dead mites for analysis in their lab, she said. So far, the chemical compound looks promising as a potential treatment alongside five or six others currently available, Plettner said. It’s important to rotate through different treatments from year to year, she said, because the mites are starting to show resistance to what she called the “gold standard” of existing treatments. The varroa mite originally parasitized honeybees in Asia before spreading to Afro-European honeybee populations about 100 years ago, she said. “In terms of evolutionary time, this is relatively short. And that’s why our bees are so affected by this, because … in an evolutionary sense, they haven’t had a chance to develop, through selection, natural defences.” Efforts are underway to find bees that are more naturally resistant to the mites, said Plettner, noting one of her own hives at her home has had no mites this summer, while the neighbouring hive was “boiling over” with the pests. “Every once in a while, you get a hive that is quite resistant to the mite, and this is a subject of very intensive research and bee breeding efforts.” It will take some years to commercialize the compound, making it available as a treatment, Plettner said. The researchers still need to understand how it works and demonstrate that it’s safe for bees, beekeepers and the surrounding environment, she said. It’s especially important to mitigate varroa mite infestations given the range of environmental pressures bees are facing, Plettner said. Climate change is affecting the ecology of honeybee habitat, changing the availability of the flowers and plants they need to survive, she said. Moreover, bees are part of a system of intensive agricultural practices that employ pesticides and herbicides across Canada and worldwide, she said. “Even if near the apiary is not sprayed, bees will fly quite far, up to two kilometres, to seek flowering plants and food,” she said. “So they can get accidentally contaminated with substances that are harmful.” At the same time, many plants that are considered weeds and targeted with herbicide by agricultural operators are important for bees, Plettner said. Brenna Owen, The Canadian Press
<urn:uuid:52c0f3a4-0d13-4f28-95e6-faf37edac245>
CC-MAIN-2023-50
https://www.cloverdalereporter.com/news/b-c-scientists-hopeful-in-fight-against-mites-that-puncture-and-kill-honeybees-2442168
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.94834
912
3.921875
4
Desert biomes are incredibly interesting to look at. They cover about 20% of the Earth and occur where rainfall is less than 50 cm/year. There are mainly four types of deserts in this biome – hot and dry, semiarid, coastal, and cold. These ecosystems are identified by the fact that they don’t get a lot of precipitation during the year. Only those plants and animals that are able to adapt to the climate and temperature of desert can survive there. Deserts that receive rain as the main form of precipitation are called as hot deserts while those which receive snow as their main form of precipitation are called as cold deserts. Here are some quick and interesting facts about desert biomes. - About 1/5th of the world is covered in deserts. - The only continent that does not have a desert is Europe. - Most desert biomes are hot in the day, and cold at night. The exception is the cold desert, which we will take a closer look at below. - The Sahara desert in North Africa is the largest desert in the desert biome as it covers over 300 million square miles. - Not many living organisms, plant or animal, can reside in deserts. - There are few large mammals in the desert biome as most of them are not capable of storing enough water and the vegetation does not grow very tall. So, you can see small animals, rodents and reptiles as they can escape the heat of the sun by hiding themselves under small scrubs. - Many of the desert animals tend to be nocturnal. They sleep during the day when the temperature is high and come out at night when it is a little cooler. - Many people enjoy visiting deserts, and many deserts have some sort of human population. - The animals and plants that live in the desert adapt to what they need – for example, animals store fat in one spot, cacti are covered with hard wax to prevent water leaving them. - There are four major types of desert biomes, which we’re going to explore in the next section of this article. The desert is natural; when you are out there, you can get in tune with your environment, something you lose when you live in the city. – Robyn Davidson 4 Major Types of Deserts As mentioned above, there are four major types of deserts that you may come across when it comes to desert biomes. Here is a quick look at each of them. Hot and Dry Desert Hot and dry deserts are the stereotypical deserts that many of us think about when we’re talking about the word “desert.” Here are some of the main traits that you will notice when you’re exploring a hot and dry desert. - There are multiple hot and dry deserts all over the world; four in North America (Chihuahuan, Sonoran, Mojave and Great Basin), and various others located throughout the world. - Summers are unbearably hot; temperatures are warm throughout the rest of the year. - There is little to no rainfall during the summer months in a hot and dry desert climate. - Winters come and there is very little precipitation at all, but that is usually when it occurs. - Average temperature during the day is 23 degrees Celsius; it can get as hot as 49 degrees Celsius. - Plant life is rare in hot and dry deserts; mostly small trees and shrubs. - Animals of all types live throughout the region (insects, mammals, arachnids, birds, reptiles). - Carnivorous animals are common due to the lack of plant life in the hot and dry desert. They mostly stay inactive in protected hideaways during day when it is too hot and come out at night when it is a little cooler. - Soil is very rocky, coarse, and/or filled with gravel. Because of this, water drains incredibly well and won’t stick around below the surface. Semiarid deserts are those that we think of in the northwestern part of the United States. There are others located throughout North America, Northern Europe, and Northern Asia. The major types of semiarid desert include the sagebrush of Utah, Montana and Great Basin. - Semiarid deserts are only located in the Northern hemisphere due to their unique setup and the temperatures that they maintain throughout the year. - Summer temperatures average about 23 degrees Celsius, but it never gets warmer than 38 degrees Celsius (much cooler than hot and dry deserts). In the evening, the temperatures are cool, at around 10° C. - There is little to no rainfall during the summer months, with spots of precipitation during the winter. The annual rainfall ranges from 2-4 cm annually. - Soil is shallow, sandy, and fine, especially when compared with the hot and dry deserts that we discussed above. - Plants in semiarid areas often taste badly and have spikes or hairs that make them difficult to touch or even go near. This is to prevent animals and people from going near them and causing them to lose their grip (their roots are too shallow to have a solid grip). - Mammals, small birds, reptiles, and insects reside in the area. Animals are both diurnal and nocturnal, and use the shade of the plants to be able to function during the daylight hours. Coastal deserts are one of the most unique deserts that you will find when you’re looking. These deserts can be found in cools to warm areas such as the Nearctic and Neotropical realm. They aren’t very common; the most well known is the Atacama, which is located in South America. - Summers are warm, with temperatures rarely going above 20 degrees Celsius. The mean temperature in summers ranges from 13-24° C. - Winters are cool, with temperatures between -3 and 6 degrees Celsius; on occasion, it will dip down to -4 or -5 (C). - Coastal deserts get more rain than their semiarid and hot and dry cousins; they can get up to 12 or more centimeters every single year. - Like semi-arid deserts, the coastal desert ends up being incredibly fine. - The plant life in coastal deserts thrives a bit more due to the amount of rain that the areas get. Their roots go deeper as to ensure that they get all of the water that comes when it rains. - However, most of the plants that are in the coastal desert are also shrubs and bushes, with some grasses. - Raptors, reptiles, insects, and mammals are all common in coastal deserts due to the more desirable conditions. Like the semiarid deserts, there are diurnal and nocturnal animals that reside there. - Amphibians can actually live in coastal deserts, but the ones that reside in them have special adaptations that help them to adapt to living in an area that goes through dry spells as severe as the coastal areas do. Cold deserts are also incredibly unique when compared to all of the other types of deserts that we’ve looked at here. They occur in the Antarctic, Greenland and the Nearctic realm. The mean temperature in summers ranges from 21 to 26 ° C and mean winter temperature is between -2 to 4° C. The cold deserts are known to receive snow during the winter and high overall rainfall throughout the winter that averages out to 15 – 26 cm a year. Here are a few quick facts to give you a better idea as to what cold deserts are like. - Cold deserts have incredibly cold winters, which can get anywhere from -2 to 4 degrees Celsius. - Contrary to their name, cold deserts still have summers, with temperatures rarely going above 20 degrees Celsius. - Snowfall is immense, especially when compared with the other types of deserts which get next to no rainfall. The average is usually around 15 to 20 centimeters of precipitation throughout the winter months. - The most precipitation ever recorded in a cold desert in a year was over 45 centimeters, which is what some other types of deserts get over several years’ time. - Because of the landscape, the soil is incredibly heavy and has lots of pores so that it can take in every bit of water that it can. - The heaviest precipitation is either in the late spring or the early fall, depending on where the cold desert is located. - Plants are not common in the cold desert, but the ones that are there are spiny deciduous plants, along with some mosses and fungi. - Animals that reside in the cold desert are mostly mammals, due to the fact that the winters get cold. Other animals would likely die if they tried to live there. Many of these mammals are burrowers who live underground and hibernate for at least part of the winter months. - If there are lizards (which happens in some of the relatively warmer cold deserts), they are burrowers that end up hibernating when the cold months of winter come around. Desert biomes are a huge part of the world that we live in, so it’s important that we take the time to better understand and explore them. Even if areas don’t seem to fit our definition of a “desert,” it’s still important for us to embrace them and do what we can to protect them as part of our planet.
<urn:uuid:22d4b602-b0bd-425c-a9d7-5d4d76a17dbc>
CC-MAIN-2023-50
https://www.conserve-energy-future.com/desert-biomes.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.958535
1,941
3.53125
4
The understanding of how blue light affects skin health is being hampered by lack of standardised research methods, according to a new review funded by Johnson & Johnson in Singapore. While the scientific understanding of the effects of blue light on the skin has improved in recent decades, it was far from optimal. “Several factors continue to limit the progress in this field, including variations in the definition of blue light itself,” they wrote. Australian clean cosmeceutical brand Biologi relaunched its vitamin C serum after its research claims to prove that its Kakadu plum-derived vitamin C is superior to ascorbic acid. The rebrand follows the conclusion of a study jointly conducted with the Centre for Accelerator Science (ANSTO) that compared its Kakadu plum-derived vitamin C with synthetic L-Ascorbic Acid. It compared vitamin C derived from C3 type plants – such as Kakadu Plum, oranges, and blueberries – to ascorbic acid derived from C4 type plants – such as maize and sugar cane. The test concluded that Kakadu plum-derived vitamin C was better than synthetic L-Ascorbic Acid. The addition of grapeseed extract in a sunscreen formulation has been found to have anti-ageing effects on Asian skin, improving the overall youthful appearance of skin. The researchers attributed the skin-lightening effect of sunscreen with grapeseed extract to the high content of polyphenols in grapeseed extract. It was noted that skin elasticity was difficult to determine given intrinsic and extrinsic factors including age. Wearing a face mask causes physiological changes in sensitive skin but applying a salmon complex moisturiser after removing it improved conditions, according to a new study. After applying the moisturiser, skin redness and TEWL were significantly decreased compared to their values four hours after wearing masks. The moisturiser used was KAHI Multi Balm, by KOREATECH Co. Ltd. This product contains three types of salmon complex as well as fermented Jeju oil and adenosine to help moisturize the skin and improve wrinkles. Biotechnology start-up Allozymes’s claims its proprietary tech gives the cosmetic industry a way to produce natural active ingredients in an environmentally responsible manner, while also reducing cost, time and resources. Allozyme’s technology allows the company to study and sieve out the right enzymes by using tiny water droplets as vessels so it can move through the hardware. Combined with its proprietary software, the company is able to screen and sift through the enzymes and find what it is looking for – screening 10 million enzyme variants a day. Seeds of the Swietenia macrophylla (S. macrophylla) plant, commonly known as the mahogany tree, could be the up-and-coming ingredient for the global cosmeceutical industry. Based on this review, the S. macrophylla seed extract could be an agent for anti-ageing and is photoprotective when tested across the UVA and UVB spectrum. The extract could also potentially reverse UVB-induced damage because of its antioxidant and anti-inflammatory properties as shown in previous studies. Japanese personal care major Kao is partnering with beauty media and retail firm istyle to build a skin RNA database by 2023 with the sebum RNA testing technology it developed. This joint project would enable Kao to tap into istyle-owned cosmetic portal @cosme’s userbase of 15 million users as well as 17 million reviews on over 360,000 products. Ribonucleic acid (RNA) collection is expected to begin this spring and both companies are aiming to collate a database of up to 10,000 samples from @cosme members for a start. This would give Kao the opportunity to delve further into the study of skin RNA, such as identifying characteristics that would allow it better to understand and classify RNA skin types. Confusion and misinformation regarding the marine safety of sunscreens can ultimately hinder cosmetic formulators’ ability to develop safe and effective UV protection. We have seen sunscreen ingredient bans taking effect in locations such as Hawaii, Palau and Thailand and more bans on sunscreen ingredients could disadvantage sunscreen formulations and their ability to protect skin from UV damage. “If you remove oxybenzone from the formulation, then your major primary UVA protective is gone. If you went down that pathway, you would have an issue with either totally unstable sunscreens which we don't want, or not being able to use probably the cheapest, best, and most widely used UVA absorber that we have,” said Dr John Staton, Scientific Director of SciPharm. Indian Sandalwood holds a lot of promise as an active ingredient for minimalist skin care formulations and as an inventive alternative for talcum powder in make-up, says Australia-based sandalwood supplier Quintis. Indian Sandalwood oil can tap into shift towards more a minimalist approach and offering more benefits to the consumer with fewer ingredients. The firm is currently exploring the use of finely milled Indian Sandalwood as a powder that would potentially be able to replace talcum. With so much potential for Indian Sandalwood beyond perfumery, Quintis is expecting demand for it to grow moving forward. A world-first large-scale trial in Australia will assess if wearing high-factor sunscreen prevents healthy vitamin D production. The Sun-D trial is being spearheaded by researchers at The QIMR Berghofer Medical Research Institute in Brisbane. Half of the participants will be given SPF50+ sunscreen to apply every day, while the other half will continue with their usual sun protection behaviour.
<urn:uuid:23027421-7a56-4d55-a5e9-28a0c3c91bf6>
CC-MAIN-2023-50
https://www.cosmeticsdesign-asia.com/Article/2023/01/10/skin-science-top-10-most-read-stories-on-cosmetics-science-and-research-over-the-last-12-months
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.941915
1,189
2.609375
3
A ‘victim’ is defined under the California Constitution as: “a person who suffers direct or threatened physical, psychological, or financial harm as a result of the commission or attempted commission of a crime or delinquent act. The term 'victim'also includes the person’s spouse, parents, children, siblings, or guardian, and includes a lawful representative of a crime victim who is deceased, a minor, or physically or psychologically incapacitated." Victims’ have been given 17 rights under California’s Victims’ Bill of Rights Act of 2008: Marsy’s Rights. As a victim, you have the right to: Be informed about the criminal justice process; Be notified and informed of pending felony pretrial/trial dispositions; Be heard by the court at sentencing/disposition/parole eligibility hearings; The return of property when it is no longer needed as evidence; Be notified if your presence in court is not needed; Be informed about available civil remedies, financial assistance, and social services; Be compensated by the convicted offender; Be provided with a secure waiting area during court proceedings; and Have inconveniences associated with participation in the criminal justice process minimized.
<urn:uuid:8e01b243-03ae-4bb6-90ee-6e317af985c5>
CC-MAIN-2023-50
https://www.countyofnapa.org/1150/Victims-Rights
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.896764
254
2.515625
3
Why should you get your child vaccinated?November 4, 2021 11:36 am The data from the vaccine trials suggest that it is both safe and effective for children. The COVID-19 vaccines have been developed under the most intensive safety monitoring in U.S. history. We know the vaccine helps prevent kids from getting COVID-19. Although most children who have COVID-19 have mild-moderate symptoms, we know that children with medical complexity are at increased risk for severe illness from COVID-19. Recently the only children we have had hospitalized at Children’s Minnesota are those who are not vaccinated (either due to age and ineligibility or personal choice). This is especially important to remember in light of the delta variant, which is more contagious than other coronavirus variants. The current vaccines are still effective in preventing severe illness from the delta variant of the virus. Children can also have complications such as multisystem inflammatory syndrome in children that may require intensive care or long-lasting symptoms that affect their health and well-being. The virus can cause death in children, although this is rarer than for adults. The vaccine helps prevent or reduce the spread of COVID-19: Like adults, children also can transmit the coronavirus to others if they’re infected, even when they have no symptoms. Getting the COVID-19 vaccine can protect the child and others, reducing the chance that they transmit the virus to others, including family members and friends who may be more susceptible to severe consequences of the infection. Getting vaccinated for COVID-19 can help stop other variants from emerging: Cases of COVID-19 are increasing among children, and the delta variant appears to be playing a role. Reducing viral transmission by getting vaccinated also reduces the virus’ chance to mutate into new variants that may be even more dangerous. However, the virus can transmit easily between unvaccinated children and adults, giving new variants a chance to emerge. Having your child vaccinated for COVID-19 can help restore a more normal life. Getting vaccinated will also help keep children in school and participating in the things they enjoy. Children exposed to the coronavirus who are vaccinated are less likely to get infected, and so are more likely to be able to continue participating with less disruptions to school attendance and other activities. COVID-19 vaccines help protect the community: Another reason to strongly consider a COVID-19 vaccine for your child is to protect the health of those living and working in your area. Each child or adult infected with the coronavirus can transmit the virus to others in the community. If this happens some of the people so infected will become quite sick themselves or further spread the virus to others who will become very sick, and maybe even die — all because of a preventable infection. Posted 11/4/21 @ 11:36 a.m.
<urn:uuid:617b8ce6-10e0-4675-ae2b-42ec13ccdb3f>
CC-MAIN-2023-50
https://www.crccs.com/faq/why-should-you-get-your-child-vaccinated/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.960885
591
3.34375
3
Lombard Seaxe Knife is based off a 6th century version. The Blade is 5160 tempered carbon steel with a hardwood handle. The tang is peened over the metal end cap of the handle. A hand stitched leather scabbard is included. A short sistory of the Seax Knife A scramseax (also scramsax, scramseaxe, scramaseax, scramasax, scramaseaxe and sometimes referred to as simply scram, seax or sax) was a type of Germanic single-edged knife. Scramseax seem to have been used for warfare and as a tool. They occur in a size range from 2.9" to 29.5". The larger ones (langseax) were probably weapons, the smaller ones (hadseax) tools, intermediate sized ones serving a dual purpose. Wearing a scramseax may have been indicative of freemanship. The scramseax was worn in a horizontal sheath at the front of the belt. Scram refers to food and seax to a blade (so, "food knife"). There is some debate about the authenticity of the longer word scramseax. The Saxons may have derived their name from seax (the implement for which they were known) in much the same way that the Franks were named for their francisca. This claim is largely supported by the appearance of scramaseaxes in early Saxon heraldry. Please note: Wood handles will vary in color from shown. Overall: 19 1/8" Blade Length: 12 1/2" Weight: 1 lbs. 4 oz. Point of Balance: 1 1/2" below hilt Blade Steel: 5160 Specs will vary slightly from piece to piece. Crafted By : Get Get Dressed For Battle . We Also Recommend
<urn:uuid:3a25911c-c233-495f-8056-5396679ad18d>
CC-MAIN-2023-50
https://www.darkagecreations.com/products/lombar-seax
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.95867
384
2.546875
3
We are open - safety is our top priority! Posted on: October 13, 2015 See how your Age Affects Tooth Sensitivity As you’ve gotten older, have you experienced tooth sensitivity? This is a popular problem but you don’t need to suffer with sensitive teeth. Visit an affordable dentist and discover trusted tips to help you relieve and reduce sensitivity. The Distress of Tooth Sensitivity Have you experienced a sudden sharp stinging or painful sensation when eating, drinking, breathing cold air, or simply brushing your teeth? This is called tooth sensitivity and this sensation can last for a moment or linger over time. The condition is very common and is experienced by more than 40 million adults. The best way to soothe your sensitivity is to have an affordable dentist get to the root of the problem because sensitive teeth can have a number of causes, including: - Erosion of tooth enamel, which can sometimes be a problem after a bout of vomiting - Too-aggressive tooth brushing - Not brushing or flossing enough - Gum recession that exposes the tooth’s underlying layer of dentin or the root of the tooth, which creates sensitivity - Frequent consumption of acidic foods and beverages - Teeth grinding - Acid reflux - Diabetes, which can lead to gum to disease Typical Age for Sensitive Teeth Tooth sensitivity can occur at any age, but research shows that it’s frequently felt between the ages of 20 and 50, with the most cases occurring from age 30 to 40. This is sometimes attributed to the fact that adults are more likely to have receding gums, a common cause of sensitive teeth. And since time results in more wear and tear on tooth enamel, this increases the likelihood of sensitivity among adults. Remedies for Tooth Sensitivity Luckily, an affordable dentist can easily treat sensitive teeth or help you avoid the problem entirely. To try to head off this pain altogether, follow these three tips: - Use a soft-bristled toothbrush to avoid enamel and gum erosion. - Brush and floss gently to prevent erosion of gums and tooth enamel. - Select a non-abrasive or desensitizing toothpaste to protect tooth enamel. To learn about our family dentistry practice in South Bend, call The Dental Center of Indiana today or make an appointment. The Dental Center of Indiana offers affordable family dentistry and gentle, compassionate dental care in South Bend. With 6 affiliated practices throughout Indiana, our offices are conveniently located with extended hours to meet your needs. At The Dental Center of Indiana, we provide most dental services, from basic preventative care and general dentistry to specialized procedures and complete dental reconstruction. We accept most dental insurance plans and offer affordable financial solutions for any budget. Patient satisfaction is our top priority and we strive to provide the exceptional, affordable dental care and personal touch that lead to lasting relationships. A smiling patient is our greatest reward and we look forward to keeping those smiles healthy, beautiful, and bright. Discover an affordable dentist who truly cares at The Dental Center of Indiana.
<urn:uuid:9547c30d-4250-4180-ab86-453ec38b973c>
CC-MAIN-2023-50
https://www.dentalcenter-in.com/blog/see-how-your-age-affects-tooth-sensitivity/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.923795
646
2.9375
3
Learn to love reading with this Level 2 DK Reader Discover the world around you with the bright and colourful Amazing Buildings. Do you know how the pyramids were built? Are there buildings floating in space? You'll be amazed at how much you'll learn about buildings around the world. Level 2 Readers have simple sentences, limited vocabulary and large type - ideal for readers aged 5 to 8 to help them build their confidence. Amazing Buildings is perfect to read aloud together, with lively illustrations and an engaging story that encourages reading and builds a child's confidence. Now available with text that lights up as you read along.
<urn:uuid:1cb3a902-57c0-45ea-8357-1fb3ebaa5cdd>
CC-MAIN-2023-50
https://www.dk.com/uk/book/9781409348573-amazing-buildings/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.962342
124
2.765625
3
What is the purpose of the activity Mcq? These Multiple Choice Questions (MCQ) should be practiced to improve the Android skills required for various interviews (campus interviews, walk-in interviews, company interviews), placements, entrance exams and other competitive examinations. What is the example of an activity in Android? The most specific block of the user interface is the activity. An Android app contains activities, meaning one or more screens. Examples: Login screen, sign up screen, and home screen. An activity class is per definition a class in Android. What is an MCQ exam? What are MCQs? o In an MCQ you will usually have to select the correct answer(s) to a given. question from a small number of options. o Problem-solving can be required to distinguish between potential answers so. How do you get answers right on MCQ? Multiple-Choice Test Taking Tips and Strategies Read the entire question. Answer it in your mind first. Eliminate wrong answers. Use the process of elimination. Select the best answer. Read every answer option. Answer the questions you know first. Make an educated guess. What is an activity in Android? An activity provides the window in which the app draws its UI. This window typically fills the screen, but may be smaller than the screen and float on top of other windows. Generally, one activity implements one screen in an app. What is mobile communication in simple words? Mobile communication is the exchange of voice and data using a communication facility at the same time without any physical link. What is the MCQS with answers? A multiple-choice question (MCQ) is composed of two parts: a stem that identifies the question or problem, and a set of alternatives or possible answers that contain a key that is the best answer to the question, and a number of distractors that are plausible but incorrect answers to the question. Is there any trick to solve MCQ questions? The Golden Rule of Guessing: Every MCQ has an option which basically screams Of course Im not right. Always eliminate the obviously wrong choices first they help through all the different types of problems there are. For example, if an option is All and you know one of the options to be wrong , bingo! What is mobile in communication? Mobile Communication is the use of technology that allows us to communicate with others in different locations without the use of any physical connection (wires or cables). Mobile communication makes our life easier, and it saves time and effort. How do I answer MCQ exam? An EMQ has a list of 10 possible answers (diagnoses, drug options, etc) given at the outset. The candidate is then given three short scenarios. In each scenario they have to choose the most appropriate answer from the list. Answers can be used more than once.
<urn:uuid:a3e18442-3d66-493d-94f6-cfeab704384f>
CC-MAIN-2023-50
https://www.dochub.com/en/functionalities/work-in-phone-in-mcw
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.905901
589
2.9375
3
Modern languages are among the top A levels in terms of university application, whether you are planning to apply for a language course or many other degrees. If you are applying for a ‘mainstream’ language (French, Spanish, German, etc), a good A level grade in the same language is usually required. Indeed, quite a few of our students move on to a language degree. Interestingly, statistics provided by university language departments show that most students with a language degree do not go on to a career in which the language is the main focus (eg teaching, translating). Instead, many language graduates work in businesses, banking, etc. An A level in a mainstream language can also lead to a degree in a less popular language that you have never studied before (eg with a French A level, you can start a degree in Arabic never having studied it). Increasingly, universities will include an A level in your native language (e.g. you are French and do a French A level) in their offers, but it is not guaranteed. If you are considering this possibility, you may want to talk to the Head of Department as there may be flexibility, for instance in doing an A level in your native language as an extra subject, or on an accelerated course.
<urn:uuid:306421b9-a807-4353-9f62-47d85e8bf536>
CC-MAIN-2023-50
https://www.doverbroecks.com/academic-excellence/a-level-subjects/french
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.969633
258
2.703125
3
(Editorial) The "Father of Algebra" Whose Name You Don't Know Updated: Jan 9, 2021 Author: Rizwan Amir Chief Editor: Stéphane Bincheng Mao Source: World of Math When it comes to the field of mathematics, many remember the likes of Pythagoras, Isaac Newton, and esteemed physicist Albert Einstein. But only a few remember Muhammad ibn Musa al-Khwarizmi, a Persian scientist known for his works in mathematics, geography, and astronomy. He is considered the grandfather of computer science, the founder of algebra, and his name is the origin of the word algorithm. Al-Khwarizmi was born in 780 AD in Persia during a time of scientific progress and vast trade networks between China and India. His name is believed to come from the region Khwarizm where he was born. Very little is known about his early life, but al-Khwarizmi began his career in the House of Wisdom in Baghdad analyzing and translating manuscripts from the ancient Greek and Hindu world. It is here, under the Caliph al-Ma'mun, he produced his seminal work al-Kitab al-mukhtasar fi hisab al-jabr wa’l-muqabala which was translated to Latin as The Compendious Book on Calculation by Completion and Balancing. It is in this book, al-Khwarizmi systematically laid out the foundational elements of linear and quadratic equations which became known as algebra. The word for algebra comes from the arabic word al-jabr. From there he revised longitudinal and latitudinal values in the Ptolemy’s Geography with his second book Kitab surat al-ard (“The Image of the Earth”). He contributed to the table of sines and tangents and innovated the sundial which made it easier to determine the time for prayer. His work on mathematics and algorithmic way of solving problems would be the fundamentals for modern day computer science and data analysis. He will be remembered as one of the most influential mathematicians to ever arise from the Islamic world.
<urn:uuid:f3a91b1c-3b1d-411e-84d9-710e5118506b>
CC-MAIN-2023-50
https://www.eastcoastcoalition.com/post/the-father-of-algebra-whose-name-you-don-t-know
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.959934
449
3.359375
3
March 10, 2014 If you haven’t seen them yet, here is a round-up of some good educational iPad apps that have been recently released. During my online meandering I come across hundreds of apps and I bookmark the ones I deem important to share here with you. the purpose behind these lists is to keep teachers and educators abreast of the latest releases in the world of educational iPad apps. Have a look and share with your colleagues. The app gives children over six a step by step method for creating their own animations and moving images using colour pencils, paper, and a tablet computer. Fine motor skills, creativity, and imagination are stimulated in a playful and fun way. It helps with visualizing the information which is a very important piece for comprehension skills It can be used for a variety of children including special educations students who have language learning deficits, reading comprehension deficits, and specific learning disability due to language weaknesses. Promotes language through motor skills modality It helps with active participation skills Promotes internal motivation to keep listening and interacting in the task. A groundbreaking cognitive training game designed with Harvard and UC Berkeley neuroscientists. Thinking Time trains memory, attention, reasoning and key cognitive skills through scientific games. Tell About This is an easy platform to inspire and capture children’s thoughts and stories! They will love to explore and respond to any of the 100 interesting photo prompts using their voice. Craft custom prompts and add profiles to personalize the experience! Simple save/share options. 5- Elements 4D Part educational story and part game, the Elements 4D app offers a new, fun way to experience augmented reality and learn about real-life chemistry. Paired with either paper or wood blocks that are inscribed with the symbols of 36 elements from the periodic table, this app will instantly transform a simple, inanimate object into dynamic, dimensional, 4D representations of each element. Literacy Leveler™ makes it easy to level children’s books in your collection and find books of an appropriate reading level. 7- Anatomy 4D 4D Anatomy allows viewers to understand and interact with complex information with unprecedented ease, speed, and depth. Visually stunning and completely interactive, augmented reality is the perfect vehicle for 21st century education. 8- Home KG Home KG is an amazing free learning app for preschoolers to teach your children how to write alphabets, numbers and recognize shapes. This Kids app is a free teaching tool for toddlers and young children. It includes all English alphabets, digits from 0 to 9 and 10 different shapes. This preschool learning app works as a training guide where children can explore their creativity while learning at the same time. In this version of POMT, zoom into human bones, see how broken bones heal, and investigate some of the cool and weird cells found in the middle of our most sturdy organs. 10- Who Has What taps! Never again forget who has your Books, DVDs, Games or anything else. Just look it up in »Who has What? 2«! It’s incredibly easy and it just takes a few seconds to keep track of your Items with »Who has What?«!
<urn:uuid:cd5aca7a-a7ad-4006-974c-77e8166ab996>
CC-MAIN-2023-50
https://www.educatorstechnology.com/2014/03/10-new-educational-ipad-apps-for.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.9344
662
2.890625
3
Hay una sesión disponible: PredictionX: Lost Without Longitude Sobre este cursoOmitir Sobre este curso Humans have been navigating for ages. As we developed the tools and techniques for determining location and planning a route, navigation grew into a practice, an art, and a science. Navigational skill has long been tied to commercial, economic, and military success. However, the ability to predict when and where one will reach a distant destination is more than just a key to empire-building — it’s often a matter of life and death. Using video, text, infographics, and Worldwide Telescope tours, we will explore the tools and techniques that navigators have used, with a particular focus on the importance (and difficulty) of measuring longitude. Grounded in the principles of position, direction, speed, and time, we will learn the challenges of navigating without a GPS signal. We’ll learn how the Age of Exploration and the economic forces of worldwide trade encouraged scientific progress in navigation; and how Jupiter’s moons, lunar eclipses, and clockmakers all played a part in orienting history’s navigators. Centuries of progress in navigation have helped put humans on the moon and spacecraft on a comet. This course will explain how we got there, and how that progress enables you to get where you’re going today. De un vistazo Lo que aprenderásOmitir Lo que aprenderás - What exactly navigation is and how it works - The importance of position, direction, and speed - The many navigational tools of the 18th century - How the motion of the sun and stars aids navigation - Why longitude is so difficult to determine - The historical context of navigation’s technical advances - The role of chronometers and lunar distance - The story of John Harrison and The Longitude Prize Más información sobre este cursoOmitir Más información sobre este curso HarvardX requires individuals who enroll in its courses on edX to abide by the terms of the edX honor code. HarvardX will take appropriate corrective action in response to violations of the edX honor code, which may include dismissal from the HarvardX course; revocation of any certificates received for the HarvardX course; or other remedies as circumstances warrant. No refunds will be issued in the case of corrective action for such violations. Enrollees who are taking HarvardX courses as part of another program will also be governed by the academic policies of those programs. By registering as an online learner in our open online courses, you are also participating in research intended to enhance HarvardX's instructional offerings as well as the quality of learning and related sciences worldwide. In the interest of research, you may be exposed to some variations in the course materials. HarvardX does not use learner data for any purpose beyond the University's stated missions of education and research. For purposes of research, we may share information we collect from online learning activities, including Personally Identifiable Information, with researchers beyond Harvard. However, your Personally Identifiable Information will only be shared as permitted by applicable law, will be limited to what is necessary to perform the research, and will be subject to an agreement to protect the data. We may also share with the public or third parties aggregated information that does not personally identify you. Similarly, any research findings will be reported at the aggregate level and will not expose your personal identity. Harvard University and HarvardX are committed to maintaining a safe and healthy educational and work environment in which no member of the community is excluded from participation in, denied the benefits of, or subjected to discrimination or harassment in our program. All members of the HarvardX community are expected to abide by Harvard policies on nondiscrimination, including sexual harassment, and the edX Terms of Service. If you have any questions or concerns, please contact [email protected] and/or report your experience through the edX contact form.
<urn:uuid:d0eaeab8-c704-4a13-a978-9fc1007e5e4a>
CC-MAIN-2023-50
https://www.edx.org/es/learn/astronomy/harvard-university-predictionx-lost-without-longitude?webview=false&campaign=PredictionX%3A+Lost+Without+Longitude&source=edx&product_category=course&placement_url=https%3A%2F%2Fwww.edx.org%2Fes%2Fschool%2Fharvardx
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.904438
836
3.609375
4
Wind energy has long played a pivotal role in Australia’s renewable energy portfolio, harnessing the nation’s natural wind resources to power homes, businesses and industries. With the Federal Government’s recent initiatives supporting offshore wind projects, opportunities for wind generation are rapid expanding. As with any rapidly adopted technology, wind power presents distinct challenges that can prevent operators from getting the most out of their investment. For instance, the intricate design and sheer height of wind turbines means maintenance is a complicated undertaking that demands specialised skills and equipment. These towering structures, often reaching several hundred feet in the air, require highly trained technicians who can safely navigate both the heights and the complex mechanical components. Additionally, many wind farms are situated in remote locations, creating logistical challenges for maintenance crews. Turbine blades are sensitive equipment, susceptible to wear and tear from continuous exposure to varying wind speeds and weather conditions, necessitating meticulous inspection and repair processes. Even minor damages can significantly impact the turbine’s efficiency and overall energy production, emphasising the need for regular maintenance checks and prompt repairs. Given these challenges, wind farm operators must take a proactive approach to turbine maintenance, harnessing the most cutting-edge tools available to achieve minimal downtime and optimal energy output. Here we offer four essential tips for getting the most out of wind turbines. 1. Streamline yaw brake replacement The yaw system of a wind turbine refers to the mechanism that allows the turbine to turn horizontally so that it can face directly into the oncoming wind. It typically consists of motors and sensors that detect wind direction. Based on this information, the motors adjust the position of the turbine to ensure it is always facing into the wind. By doing so, the turbine blades are able to capture the wind’s kinetic energy most effectively, maximising the efficiency of the wind turbine. Proper yaw control is essential for optimising energy output and ensuring the longevity of the turbine by minimising stress on its structure during varying wind conditions. However, yaw brake replacement can often pose a challenge for wind turbine operators. Small yaw brake callipers can weigh up to 60kg, whereas a large yaw brake can reach 200kg. With some turbines featuring up to 20 yaw brakes to control their position, this places great strain on maintenance personnel, especially given the scale of modern wind farms. Many turbines do not have in-built elevators either, so maintenance personnel may have to climb a 100m high ladder before repairs can even commence. Fortunately, Regal Rexnord’s Yaw Brake Lifting and Installation Tool can enable easy interchange of yaw brakes in-situ, eliminating the need for heavy lifting by personnel. Brakes can be attached to the tool and lowered down to the floor for maintenance work, then reassembled units raised and installed quickly. This improves work conditions and speed, supporting greater efficiency when it comes to turbine maintenance and minimising turbine downtime. The Yaw Brake Lifting and Installation Tool is available in various configurations to suit multiple turbines. Weighing in at around 40kg, it can be easily transported too. 2. Conduct up-tower maintenance on-site Traditionally, servicing yaw brake discs required the complete disassembly of the large turbine nacelle, and components had to be transported elsewhere for maintenance, costing operators valuable time and resources. As wind turbines pivot to align with the wind, these discs naturally experience wear, and minor imperfections can escalate, disrupting the smoothness of the disc surface. Consequently, braking performance declines until eventual failure. Replacing the disc can be a time-consuming procedure, involving the use of cranes, which amplifies costs, prolongs downtime and diminishes energy output. Using a portable Disc Resurfacing Tool, up-tower operations can be carried out on-site with increased speed while not the refurbishment. Featuring a milling machine compromising that quickly replanes the disc, Regal Rexnord’s Disc Resurfacing Tool can operate inside the turbine nacelle, thanks to a compact and lightweight design. Simply mounted onto a yaw brake mounting position, the tool eliminates the need for nacelle disassembly. This eases maintenance work, while maximising energy output via reduced downtime and minimising cost. 3. Employ tried-and-tested expert solutions To optimise wind energy output, it’s crucial to have access to a specialised expert capable of swiftly delivering comprehensive solutions. This expertise ensures turbine reliability, enhancing efficiency by minimising disruptions to energy production. Regal Rexnord develops its products in close partnership with onshore wind turbine OEMs, shaping its components and assemblies to suit designs from the initial prototype phase. Turbine operators can be assured that all braking systems have undergone rigorous testing in cold, hot and humid weather conditions to guarantee performance. Replacement components and assemblies are guaranteed OEM quality, adhering to break specifications, thus delivering the utmost reliability in application. Regal Rexnord also offers aftermarket support for various turbine parts, including but not limited to brakes, pads, pistons and seal kits. Employing a turnkey approach throughout the turbine lifecycle allows for exceptional product performance and quality assurance. The end result is extended service intervals, allowing for onshore turbines to spend longer producing valuable energy. 4. Secure 24/7 support As early installations grow older and the installed wind turbine fleet increases, responsive maintenance support is incredibly important for reducing unforeseen downtime. Regal Rexnord offers its customers 24/7, 365 days-a-year global maintenance support via a dedicated service app. Maintenance engineers around the world can message or call experts at any time to access key technical information and guidance for critical repairs, enabling a swift resolution for any issue. Through a combination of the latest tools and continuous expert support, wind farm operators can overcome the challenges of turbine maintenance and significantly optimise wind turbine efficiency, ultimately ensuring the long-term viability of wind power as a sustainable energy source. This sponsored editorial is brought to you by Regal Rexnord. For more information about how Regal Rexnord Australia can help you maximise wind turbine efficiency, head to www.regalrexnord.com
<urn:uuid:c02d5321-3b23-464c-9197-b05017d6158b>
CC-MAIN-2023-50
https://www.energymagazine.com.au/4-tips-to-maximise-wind-turbine-efficiency/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.893442
1,279
2.71875
3
Reading Analysis Worksheets The work found here is much more critical of the work presented than just simple comprehension. We look for themes, motives, and evidence to make inferences from text. When you are tasked with critical breaking down a piece of literature you should focus on how the piece works. When you perform this action, your goal should be to form a plethora od questions for the author. If you can, on your own answer the questions that you propose, you have gone above and beyond what is being assigned to you from this task. Below you will find an armada of worksheets that challenge students to think critically of the work that is presented to them.
<urn:uuid:03df85d1-46e3-439d-bf17-702c7ad718d4>
CC-MAIN-2023-50
https://www.englishworksheetsland.com/readinganalysis.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.950269
138
3.921875
4
The Protection of the Environment Operations (Noise Control) Regulation 2017 specifies the methods that must be used when measuring noise from shooting ranges for the purposes of a requirement under the Protection of the Environment Operations Act 1997. This application note was developed to clarify ways in which the EPA assesses compliance with noise limits at target shooting ranges. The guidance in the application note relating to methods for the measurement of noise from shooting ranges has been superseded by the method set out in the Protection of the Environment Operations (Noise Control) Regulation 2017. The application note remains available as it also contains other useful information used to assess the potential impact of target shooting range noise on nearby residences. How noise levels are determined The EPA considers that the best way to assess shooting noise levels is with the arithmetic average of the noise levels of multiple shots. The method addresses complex issues arising because - some shots are inaudible, or audible but not measurable - measurements can be increased by other noise such as traffic, or wind The EPA does not set limits based on the level of a single shot because an inaccurate measurement could lead to an incorrect assessment that a range is not compliant. Notification of compliance assessment Compliance can be assessed without notifying the range. This is also the case for other regulated activities (PDF 455KB).
<urn:uuid:1baff978-c8c1-4ee6-82fc-fc22c8fb2be5>
CC-MAIN-2023-50
https://www.epa.nsw.gov.au/your-environment/noise/regulating-noise/target-shooting-ranges-noise
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.933618
267
2.84375
3
Typically, when you take a test, it will be set up in one of four ways: multiple choice, true and false, short-answer or a combination of the three. There’s a right, and a wrong, way to study for each type of test. If your professor has given you a heads-up that your next exam will be multiple choice, here’s how to study: 1. Make Flashcards Carry a pack of note cards with you in your bag. When your professor tells you that something is very important, or that you’ll be seeing it on the test, make a note card. When you’re studying, construct note cards that you can flip through when you’ve got a spare 10 minutes. To make effective note cards, write one question on the front and one answer on the back. Resist the urge to fill your cards with several facts and tidbits of miscellaneous information. Doing so will quickly turn your cards from effective study aids to useless time wasters. 2. Study Frequently If you don’t commit information to your long-term memory, you’ll not remember a thing when it comes time to take your exam. To commit things to long-term memory, you need to drill yourself in short, frequent bursts. Rather than sitting down for a marathon study session the evening before your exam, reread your notes every evening. Keep your flashcards in your bag and pull them out whenever you have a spare few minutes. Studying in this manner will move the information from your short-term to your long-term memory. 3. Find a Buddy Studying with a partner is an effective way of preparing for a test. Have someone quiz you using your note cards; you’ll be unable to flip the card over for the answer! As your friend is helping your study, have them put the answers you got right into one pile and the ones you got wrong into another pile. Study your “wrong” pile every day and have your friend quiz you again, adding to the “right” pile. There’s no need to continue to study information that you’ve committed to memory. 4. Practice Tests If your text book has practice tests, or your professor offers them, take full advantage! Taking the practice test will give you better insight as to what you can expect on the exam. Look carefully at the answers that you’ve missed; make new note cards if necessary. Don’t stay up the night before your exam trying to cram all of the information into your head. If you’ve been studying correctly, you either know the information or you don’t by this time. If you don’t, staying up all night isn’t going to help you retain anything! Get a good night’s sleep so that your mind is alert when it comes to taking your test. Studying correctly is the key to passing your exam. By making note cards, quizzing yourself and taking advantage of practice tests, you’ll be sure to perform to the best of your ability. Jeremy Clark is a writer and finance advisor earning his mba degree online.
<urn:uuid:f7aea28e-7986-4f69-ab0e-051403fdd778>
CC-MAIN-2023-50
https://www.essaytask.com/blog/tag/multiple-choice-exam/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.925655
668
3.3125
3
The influx of migrants and the security of external borders is a challenge for Europe. Learn more about how Parliament is addressing the situation. To counter irregular migration, the EU is strengthening border controls, improving the management of new arrivals and making returns of illegal migrants more efficient. It is also working to bolster legal labour migration and deal more efficiently with asylum applications. Read more about the EU response to migration What is irregular migration? Irregular migration is the movement of people from non-EU countries across EU borders without complying with the legal requirements for entry, stay, or residence in one or more EU countries. Number of illegal border crossings into Europe In 2015, there was a significant increase in the number of illegal border crossings into the EU. According to data from Frontex, the EU's border agency, there were more than 1.8 million illegal border crossings, the highest number ever recorded. Since then, the number of illegal border crossings has decreased significantly. In 2021, about 140,000 people entered the EU illegally. The decrease is due to several factors, such as the EU's strengthened border control measures, cooperation between EU countries and the decline in the number of refugees fleeing conflict zones. Discover more figures on migration in the EU Strengthening the EU's external border management and security The lack of internal border controls in the Schengen area must go hand in hand with compensatory measures to strengthen the external borders. MEPs underlined the severity of the situation in a resolution adopted in April 2016. Systematic checks for all at EU and Schengen external borders Systematic checks at the EU's external borders on everyone entering the Union - including EU citizens - were introduced in April 2017. In October 2017, Parliament backed a common electronic system to speed up checks at the Schengen area’s external borders and to register all non-EU travellers. Etias: authorisation for non-EU visa-exempted travellers The European Travel Information and Authorisation System (Etias) is an electronic visa waiver programme that will require travellers from visa-exempt countries to obtain an electronic travel authorisation before travelling to the EU. The authorisation will be valid for three years or until the passport expires and will allow multiple entries into the Schengen Area for stays of up to 90 days within a six-month period. It is expected to be launched in 2024. Reform of EU border check procedures for irregular migrants In April 2023, Parliament approved its position on revisions to the external border procedure for managing irregular migrants and will now begin negotiations with the Council. The changes aim to better address the complexities and challenges of managing migration while ensuring that the rights and needs of irregular migrants are respected and protected. It proposes the possibility of a faster and simplified procedure for asylum claims directly after screening. These should be completed in 12 weeks, including appeals. In the case of a rejection or dismissal of a claim, the failed applicant should be returned within 12 weeks. The new rules would also limit the use of detention. While an asylum claim is being assessed or the return procedure is being processed, the asylum applicant has to be accommodated by the EU country. Detention should only be used as a last resort. EU countries would have to set up independent mechanisms for the monitoring and assessment of reception and detention conditions, with the aim of ensuring respect for EU and international refugee laws and human rights. Screening migrants at EU border In April 2023, Parliament also approved its position for a revision of the screening regulation. MEPs are now set to enter negotiations with EU countries. The revised rules on screening will apply at EU borders to people who do not fulfil the entry conditions of an EU country and who apply for international protection at a border crossing point. They include identification, fingerprinting, security checks, and preliminary health and vulnerability assessment. The screening procedure should take up to five days, or 10 in the case of a crisis situation. National authorities will then decide on either granting international protection or initiating the return procedure. European Border and Coast Guard Agency In December 2015, the European Commission put forward a proposal on establishing a European Border and Coast Guard with the aim of reinforcing the management and security of the EU's external borders and supporting national border guards. The new agency, which was launched in October 2016, united Frontex and the national authorities responsible for border management. There are plans to give the agency a standing corps of 10,000 border guards by 2027. Integrated Border Management Fund In a resolution adopted in July 2021, Parliament approved the renewed Integrated Border Management Fund (IBMF) and agreed to allocate €6.24 billion to it. The new fund should help to enhance member states’ capacities in external border management while ensuring fundamental rights are respected. It will also contribute to a common, harmonised visa policy, and introduce protective measures for vulnerable people arriving in Europe, notably unaccompanied children. The fund will work closely with the new Internal Security Fund, focusing on tackling terrorism, organised crime and cybercrime. The Internal Security Fund was also approved by Parliament in July 2021 with a budget of €1.9 billion. Internal border controls EU countries have been reinstating border controls within the Schengen area over the last few years and these controls often last for long periods. In order to preserve free movement while addressing genuine security threats, the Commission put forward a proposal in 2021. In October 2023, Parliament agreed on its position and voted to enter into negotiations with the Council. As an alternative to internal border controls, the new rules promote police cooperation in border regions to address unauthorised movements within the Schengen area. , Apprehended non-EU citizens with irregular status often arrive from another EU country so if the two countries hold joint patrols, the irregular migrants may be transferred back to the first EU country. MEPs want to exclude several categories, including unaccompanied minors, from such returns. MEPs also propose clear criteria for imposing internal border controls in response to serious threats. A justified reason, such as an identified and immediate threat of terrorism, is required before internal border controls can be introduced, and such controls would have a time limit of up to eighteen months. If the threat persists, more border controls could be authorised by a Council decision. The proposal also allows for the reintroduction of border controls in several countries for a period of up to two years when the Commission receives notifications about a particularly serious threat affecting many countries simultaneously. Returning irregular migrants more efficiently European travel document for the return of migrants with irregular status In September 2016, Parliament approved a Commission proposal for a standard EU travel document to speed up the return of non-EU nationals staying irregularly in the EU without valid passports or identity cards. The regulation has been applicable since April 2017. The Schengen Information System The Schengen Information System was reinforced in November 2018 to help EU countries with the return of illegally staying non-EU nationals to their country of origin. It now includes: - alerts on return decisions by EU countries - national authorities responsible for issuing return decisions having access to data from the Schengen Information System - safeguards to protect migrants’ fundamental rights EU Return Directive The EU Return Directive is the main piece of legislation that sets out the procedures and criteria that EU countries must implement when returning people from outside the EU who have been staying irregularly. As of September 2018, the EU has been working to revise the EU Return Directive, aiming to reduce the length of return procedures, secure a better link between asylum and return procedures, and prevent absconding. The new provisions aim to determine the risk of absconding, which is the risk that a migrant would try to hide away from authorities, while a decision on their status is being taken. The amended rules impose obligations on migrants to cooperate with authorities. They also require EU countries to create a return management system. In a report adopted in December 2020, MEPs called for the better implementation of the EU Return Directive, urging EU countries to respect fundamental rights and procedural safeguards when applying EU legislation on returns, as well as prioritise voluntary returns. MEPs are expected to vote on their position on the changes to the Return Directive in December 2023. Preventing irregular immigration by tackling the root causes of migration Conflict, persecution, ethnic cleansing, extreme poverty and natural disasters can all be root causes of migration. In July 2015, MEPs urged the EU to adopt a long-term strategy to help counteract these factors. In order to tackle the root causes of migration, an EU scheme aiming to mobilise €44 billion in private investment in neighbouring countries and in Africa was backed by MEPs on 6 July 2017. The new EU Agency for Asylum and Asylum, Migration and Integration Fund The Asylum, Migration and Integration Fund (AMIF) is a financial instrument that supports the EU's efforts to manage migration. In December 2021, Parliament approved the fund's budget for 2021-2027, which increased to €9.88 billion. EU-Turkey migration agreement The EU-Turkey agreement was signed in March 2016 in response to the increased number of irregular migrants and refugees entering the EU through Turkey following the civil war in Syria. Both parties agreed to ensure improved reception conditions for refugees in Turkey and open up safe and legal channels to Europe for Syrian refugees. Under the agreement, Turkey agreed to take back all irregular migrants and refugees who arrived in Greece from Turkey after 20 March, 2016. In return, the EU agreed to provide financial assistance to Turkey to support the hosting of refugees in Turkey, as well as to accelerate the accession process of Turkey to the EU and provide visa liberalisation for Turkish citizens traveling to the EU. In a report adopted on 19 May 2021, MEPs underlined Turkey’s important role as host to nearly four million refugees, noting that the challenges in addressing this crisis have increased due to the Covid-19 pandemic. They condemned, however, the use of migratory pressure as a tool for political leverage following reports that the country’s authorities encouraged migrants and refugees and asylum seekers with misleading information to take the land route to Europe through Greece. More on migration and the EU
<urn:uuid:d0126771-3f1b-40dd-84d1-3c61827002df>
CC-MAIN-2023-50
https://www.europarl.europa.eu/news/en/headlines/society/20170627STO78419/countering-irregular-migration-better-eu-border-management
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.93611
2,096
2.765625
3
All of us are guilty of saying nasty things about our government and its officials, especially if we are not satisfied with their leadership (which is, unfortunately, often the case). But these utterances are often harmless, and is simply a healthy way for us to express our opinions on the governing body of our country. You may also see speech examples for students. Discussing the rampant issues of the nation and what our leaders are doing about them is a lot like discussing a particular topic in class. We’re doing it as a way of showing that we are listening and participating to matters that directly affect us. You may also like thank-you speech examples. However, if our intentions are anything more than the innocent act of exchanging perspectives with one another, then we might be traversing a different, more dangerous turf. Seditious speech is defined as any professional speech, discourse, or oration whose main purpose is to incite a violent or unlawful uprising or rebellion against the government and its several institutions. Any individual or organization who is found guilty of initiating a pandemonium among the civilians through an oral presentation intent on encouraging the masses to revolt against their bureaucracy will be punished by law. This is because the act is jeopardizing the internal security of the country by using its own people to start the conflict. You may also check out speech examples for college students. In fact, the United States federal law known as the Espionage Act of 1917 which contained the Sedition Act of 1918 prohibited any sort of seditious speech. Around 2,000 people were arrested for breaking this federal law, and 900 of them were convicted. You might be interested in appreciation speech examples. The Sedition Act is one of the most controversial amendments to the long-surviving Espionage Act, since most people questioned its opposition to free speech. If the citizens of the country have truly earned the right to expressing their thoughts and opinions without restrictions, why would they be imprisoned for a thing called seditious speech? But since America had to go through a civil war, two world wars, and conflicts with communism before it finally became independent, it cannot be blamed for being fearful of any act that may threaten its hard-earned freedom. Also, it cannot be denied that the right to free speech can be easily abused to harm the interests and welfare of the nation. You may also see launch speech examples. To be considered seditious, the Court has issued that a speech must be characterized by two main conditions. First, the speech must be aimed to promote lawlessness, which means that the individual or organization cannot be considered guilty if their main purpose was not to cause an uprising. You may also see youth speech examples. The second condition states that the speech must actually have the ability to disrupt law and order and even threaten an established government sector. If it has been proven that the party involved has truly directed their efforts toward sedition, but has not elicited any supportive outcry from the public, thus rendering their activity fruitless, they can be arrested but they will not be punished for the attempt. You may also like presentation speech examples. A speech of any form must contain and fulfill both conditions before it can be considered sedition, and before the parties involved will be sentenced for the activity. By implementing these conditions, the argument about the amendment’s opposition to the right to free speech is settled and quieted since people will be allowed to express their opinions (and even speak ill of their government) as long as it doesn’t result in any of the two aforementioned qualities. You may also check out wedding speech examples. People from our generation, with all of our ways of self-expression and the rampant social media as a direct tool, think that we can say whatever we want since we have been given the right to do so. Although this has a ring of truth in it, it has not always been the case, and people weren’t always free to speak as they wish. You might be interested in tribute speech examples. History tells us how criticizing the government can lead us to a lot of trouble which often involves prison and a legal court. Back then, it was known as seditious speech. When the United States of America’s Bill of Rights was formalized in 1791, freedom of speech became a guaranteed right to each and every citizen. But not long after this momentous day, the American Congress passed the Sedition Act of 1798. You might be interested in school speeches examples. Officials back then were convinced that by giving the people the power and right of speech, they will have the chance to become openly critical with their government which can only lead to violence and risks to their authority, and to the existence of United States as a country. You may also like acceptance speech examples. Seditious speech, or any false, malicious, or scandalous statements directed at the government and its officials, can subject a person found guilty to conviction and imprisonment. Even a person simply referring to a government official as tyrannical will find himself in the government’s bad side. You may also check out commencement speech examples. After the Sedition Act has expired and President Jefferson pardoned those who were convicted of seditious speech, the Congress attempted another shot through the Espionage Act of 1917. This one criminalized false statements made for the purpose of helping the country’s enemies, disrespecting the government, the American flag, and the constitution. You may also see dedication speech examples. A Supreme Court was created to focus specifically on the Espionage Act and the other related bylaws that the Congress has issued. They have embraced the “clear and present danger” standard, which was a doctrine that the Supreme Court used to judge the limitations of the right to freedom of speech. You may also like welcome speech examples. In 1949, the Supreme Court rejected the “clear and present danger” standard because they realized that a man’s right to freedom of speech must not be limited or restricted even by the government’s claim that the person has incited a violent response due to his formal speech. The Supreme Court looked back on a citizen’s right to speech as stated by the First Amendment and understood that he cannot be disallowed to state his opinions and thoughts simply because others may agree or disagree to it. The First Amendment of the United States Constitution states that: “The congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or of the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” You may also see special occasion speech examples. With this law in the U.S Constitution, most people would be confident that their right to free speech would never be taken from them. However, with the approval of the Sedition Act, the nation has proven that their First Amendment is indeed subjected to limitations and that their right to free speech is still restrained by what the present government and Congress deem right. You may also like informative speech examples. Sedition and treason are two terms whose definitions are often interchanged and confused. Some may argue that sedition is also a form of treason since you are not being very loyal to your government by willfully initiating violent acts against it, and that sedition is an effective way of conducting treason. You may also check out campaign speech examples. This argument makes a valid point; however, it overlooks the fact that there are distinct differences between the two terms. First of all, sedition is considered a lesser crime in comparison to treason, since a seditionist only encourages and talks about rebellion but does not take actions to do so. Treason, on the other hand, is outright betraying one’s country by involving in specific traitorous activities, such as waging war, helping the country’s enemy, and committing espionage. The law must prove that the individual in question is truly actively engaged in a plan to overthrow the government. This is considered a more severe crime, and will bring harsher punishments to the guilty. You might be interested in after dinner speech examples. The main reason why the government has presented and approved the Sedition Act despite the existence of the people’s right to freedom of speech as stated by the First Amendment is largely because of their fear of jeopardizing the security of the nation for which they have fought many wars to achieve. You may also see school welcome speech examples. This fear is highly rational and understandable since America, and every other country in the world, has lost so many men just to defend their land and to finally gain peace, which they don’t want to be disrupted by something as powerful as speech. You may also like introduction speech examples. However, time has shown its authority once again since the Sedition Act has been abolished by the country’s Supreme Court after understanding that the First Amendment must always be respected and observed on top of everything else, since freedom of speech is a right that every citizen deserves. You may also check out ceremonial speech examples.
<urn:uuid:e869bff2-aa29-4261-8e6a-fa9133b79675>
CC-MAIN-2023-50
https://www.examples.com/business/seditious-speech.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.97475
1,871
3.25
3
Recently saw this post on [Boing Boing](http://www.boingboing.net) about virtual economics. Cory Doctorow’s take on the inflation endemic to these games: > I think that this has profound implications for in-game democracy — democracy requires that you play together for a long time, in order to establish civil society. But inflation is such a fixture in virtual worlds that they are necessarily short-lived — only by beating inflation can games sustain themselves. Cory is right, I think: dealing with these things is an essential step for the kind of virtual world that [Second Life](http://secondlife.com/) wants to create. I suspect that [World of Warcraft](http://www.worldofwarcraft.com/) (where the main focus) is not really the economic parts of the world) doesn’t need to worry so much. The simplest economic theory for inflation is the [quantity theory of money](http://en.wikipedia.org/wiki/Quantity_theory_of_money). In simple terms, we can > M . V = P . Q where M is the total money supply, and V is the velocity of money (how quickly money changes hands), P is the price level and Q is the number of ‘things’ in the economy. So what causes inflation (that is, changes in P)? > Change in P = Change in M + Change in V – Change in Q (Strictly that’s in log change terms, but just think of it as percentage changes) So the simplest version of inflation is that it happens when growth in the money supply outpaces growth in output in the How do virtual worlds generally try to control things? Well, there are some significant problems to do with growth in the money supply, because there are lots of in-game tasks that create money. In Second Life, for instance, many players get a weekly allowance from the system, all of which is new money. Most of the systems involve ‘sinks’ that remove money from the game, which are adjusted to try and keep the system in balance. But what would we call this system if it happened in real life? Well, the government of the system is printing money to finance welfare payments. Inflation isn’t really a surprise. Can we use this real life analogy to inform the system design? How could they get inflation under control? First, the government could run a balanced budget. The taxation in these systems is pretty implicit, making it explicit would allow a proper government budget to be produced. Then welfare payments could be balanced against income. I suspect that the system most games use is actually pretty close to this, but the democracy element that Cory suggests would really require that this power be taken out of the ‘god’ of the system and placed in the hands of some explicit government within the system. Secondly, an independent monetary authority or central bank could play a part. Real world countries rely on monetary policy to control inflation, through setting a price on money. It’s not as clear to me that this could work in a virtual setting. In particular, in the absence of a functioning credit market it’s hard to see how the normal monetary transition channels could work. (Setting up a banking or credit system in a virtual economy wouldn’t be that hard. The tricky part is distinguishing it from a [Ponzi scheme](http://en.wikipedia.org/wiki/Ponzi_scheme)). All of this is just a long way to say that so long as the key government functions, such as welfare, taxation and control of the money supply, are in the hands of the ‘god’ of the system, then democracy in virtual worlds is probably going to have a hard time getting started. What’s needed is a virtual world that hands over more of the control of these types of levers to the players through the form of some kind of government. So in actual fact, the elements that Cory suggest need to be solved to create a virtual democracy are actually some of the things that might help such a virtual democracy grow. But until then, Second Life and its friends look to just be [a bunch of hype to me](http://valleywag.com/tech/second-life/).
<urn:uuid:04717bb3-0f55-4657-ac8a-68a93403dfc3>
CC-MAIN-2023-50
https://www.exasperatedcalculator.com/2007/03/virtual-economics/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.928919
954
2.671875
3
The first question to ask and indeed to answer when looking into the area of blood types is: what is blood? What is Blood? Blood is – for the most part – the liquid part of the human body, which is called Plasma; and this Plasma contains proteins, clotting factors, electrolytes (which carry small electrical stimuli) and a varying number of cells. These cells when broken down are: - Platelets: Small cells involved in the clotting process which enable the flow of blood to be kerbed if a small cut or wound is inflicted - Leucocytes: The blood’s white cells. - Erythrocytes: The blood’s red cells. After a wound has been inflicted and clotting has taken place the remaining fluid – known as serum – is a discoloured yellow and is still full of proteins and enzymes – this serum as we shall discuss is useful in the forensic process. Blood Groups and Crime Now that we have established in a little more detail what blood actually is; it is important to look at how the different blood groups are made up and also how these blood types are used in the categorisation of suspects in crimes where blood and other bodily fluids are secreted. Forensics use a system called the ‘ABO System’, which is a system that measures antigens; antigens within the body determine blood type and are normally categorised as either A or B. Antigens categorised as being Type A are found in an individual’s red blood cells whilst the same equation can be applied to someone of Type B blood grouping. Also within the blood typing system there are Rhesus antigens, which can be categorised as Type D; should an individual’s red blood cells have these Rhesus antigens they are classed as RH Positive and likewise if they do not appear they are classified as RH negative (or Rhesus Negative). At a crime scene where there has been blood spilled – either that of the victim or that of the assailant – and indeed in some instances that of both parties; a serologist will take blood samples in order to identify who’s blood belongs to whom. Taking the aforementioned factors into consideration makes this process somewhat less complex than it perhaps sounds and this blood grouping system is also used to determine from which blood group the individual’s parents were categorised. Parents may have different blood from their children and indeed siblings may also have different blood groups but through the use of DNA fingerprinting it is possible to draw up certain characteristics that are shared between the father and mother and their offspring; this is called Mitochondrial DNA and can be found all the way through a family’s bloodline over many generations. These blood types although used as a means of collating DNA evidence can be used more as a means of identification that an admission of guilt. As the discovery of a blood type through the use of a sample is useful it is not an exact enough science to prove that an individual has been the perpetrator of a crime on its own. Other such evidence – as we have already mentioned – DNA evidence, trace evidence and eye witness accounts must all be used to compile a picture that can be used in any prosecution case.
<urn:uuid:b77826e6-8fe6-4d3a-9442-b011f26a2875>
CC-MAIN-2023-50
https://www.exploreforensics.co.uk/blood-types.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.960376
675
3.9375
4
Approximately 85% of cases of COPD are the direct result of cigarette smoking, either active or passive. The other 15% are attributable to exposure to industrial dust or air and occupational pollutants, while a small number of people with COPD have an inherited genetic deficiency. There is no cure for this debilitating condition, but sufferers can improve their quality of life through self help and medication. Symptoms of COPD COPD sufferers experience obstruction of their airways and compromised breathing. The main symptom is shortness of breath and there may be accompanying wheeze, reduced exercise tolerance, cough and sputum. The diagnosis of COPD is made on your medical history, clinical examination, lung function, and other specialised testing. In emphysema, the small air spaces or alveoli enlarge, reducing the surface area available for oxygen to be absorbed. In chronic bronchitis, the size and number of the mucus glands are increased leading to copious overproduction of thick sticky mucus. The two conditions often overlap with resulting inflammation and fibrosis, the outcome being restriction of air into the alveoli, consequently affecting the amount of oxygen in the blood. However, in bronchitis the obstruction results from the copious overproduction of thick, sticky mucus. By far the most important self-help step for COPD sufferers is to stop smoking. Without this vital first step, no other self help strategies will work to improve your quality of life. Inhaling second-hand smoke will also aggravate COPD so ensure that smoking friends and family understand your situation and protect you from the damage of their cigarette smoke. In some cases it may be necessary to change jobs if occupational pollution is a problem. Preventing and controlling COPD 1. Move it or lose it Yes, it’s vital that you exercise regularly. Many COPD sufferers become inactive because of difficulty with breathlessness on exertion. In reality, regular, gentle and increasing levels of exercise is vital for long-term management of COPD. Inactivity causes the lungs and other muscles to become progressively weaker and less efficient. Giving muscles a regular workout increases their ability to function with lower levels of oxygen. Choose an exercise you enjoy and start very slowly, gradually building up the exercise; gentle walking on the flat is one such great exercise. Check with your doctor before you begin your exercise programme. 2. Use your medication There are a number of different medications that may help. Preventer and reliever inhalers are very helpful, and antibiotics, steroids and oxygen are sometimes used in the management of COPD. Preventer inhalers are steroid-based and work by reducing the swelling in the airways as well as reducing mucus production. Relievers relax the muscles in the breathing tubes of the lungs helping keep them open for improved oxygen uptake. COPD sufferers are more prone to chest infections because of the increased mucus production in their lungs. Antibiotics are used to treat infection whenever the normally white or clear lung mucus becomes yellow or green. These are often used together with oral steroids. When severe COPD leads to low levels of oxygen in the blood, the heart is put under increased strain: in this case, oxygen therapy is used to increase oxygen levels in the blood. 3. Do regular breathing exercises There are special breathing exercises that your physiotherapist can teach you to help control your breathing. These include diaphragmatic and pursed-lip breathing. 4. Optimise your nutrition Breathlessness easily leads to exhaustion. It is important to give your body all the nutrients, protein, carbohydrates and healthy fats it needs for optimum cellular nutrition. A Mediterranean style diet has been shown to be very helpful for men with COPD. If you are carrying extra weight it is vital for you to slim down to a healthy weight to lessen the load on your already overworked lungs and heart. Work with a health professional such as a dietitian to achieve this. 5. Conserve your energy resource Breathlessness and fatigue are a fact of life for COPD sufferers. Think smart to find ways of conserving energy while still achieving. Pace yourself and sit and rest between activity; if you can sit to perform a task instead of standing, all the better; attach wheels to things you have to carry around a lot (such as a washing basket) and push rather than carry; delegate to others and get family and friends involved with carrying out necessary tasks. Dry skin – it’s a common winter thing At this time of year, as winter kicks in, I frequently talk to people asking for help to relieve dry skin. .. I was fascinated to read that the UK have an Anger Awareness Week in early December. Of all the awareness weeks that exist, this surely is one that al..
<urn:uuid:d2423698-1367-4464-9f61-40bf7c26ffbd>
CC-MAIN-2023-50
https://www.familyhealthdiary.co.nz/copd/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.94503
994
2.796875
3
When running tests or pushing updates or patches to your virtual machine, it’s good to have reassurance that any changes you make aren’t going to leave with you a broken project. Maybe some of your code doesn’t work with the new version of the operating system, or maybe your data is broken by a test. A good way to help prevent this happening is to create a copy of your virtual machine. CloudNX Root Servers offer three different methods of creating copies of your virtual machines: images, clones and snapshots. But what exactly is the difference between the three? A snapshot is a ‘picture’ of a server taken at a moment in time. On CloudNX, these snapshots are retained for 48 hours, and users can revert their servers back to the snapshot at any time. A snapshot allows a user to quickly take a copy of their machine, change the settings or run the updates that they want to run safely in the knowledge that they can roll their server back to its snapshot state if anything goes wrong. Snapshots are read-only, so it just gives you a picture to revert back to, rather than a writable copy of the VM. Like a snapshot, a server image can be used to rollback/restore a server to a time before it broke. Taking an image of a server copies all of the SSD data the server is storing. This backup copy can be used to recover the original server if anything goes wrong. The difference between images and snapshots is that images can be stored indefinitely, whereas snapshots only remain for 48 hours. As well, a server can only have one snapshot at a time, whereas a server can have many images from different times. Images can be set up to run automatically, in intervals of either every day or every week, up to a total of 50 images. A common schedule is to configure an image to be taken every day of the week, with each new image overwriting the oldest image from seven days ago. This way you’re not using more storage than you need to, but can be sure that you can revert to an image from any day in the last week if necessary. A server image can also be used to build a clone of a server. Cloning a VM creates a duplicate copy of it. Unlike an image, a clone copies the CPU and RAM as well as the SSD storage, and creates a writeable copy of the original VM. These clones can be edited, modified and updated in complete isolation to the original VM, without affecting it. This is useful when creating staging environments or test copies of the data. As well as this, cloning saves time when setting up server farms or large numbers of similar-spec servers. Instead of having to create each server individually, you can spin up one VM and then clone it repeatedly to create VMs of the same spec. This is a significant timesaver when starting a project that requires multiple VMs. Which one to use? If the goal is to build a QA platform or a test environment, a clone is the suggested method to use. As a quick failsafe, just in case an OS update or patch ends up breaking something in your project, having a recent snapshot to revert to is a good solution. And having images taken every day, replacing the last week’s image is a better ongoing solution. Visit the Fasthosts website for more information on cloud servers.
<urn:uuid:e38caafb-20bb-4989-875b-4e9f8cf7d47b>
CC-MAIN-2023-50
https://www.fasthosts.co.uk/blog/snapshots-images-and-clones/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.924852
706
2.71875
3
Song of Sounds The information below is taken from the Year R parent handbook, given to all families at induction and also available from the Geckos class page. Phonics in Year R What is phonics? Phonics is a way of teaching children how to read and write. It helps children hear, identify and use different sounds that distinguish one word from another in the English language. Written language can be compared to a code, so knowing the sounds of individual letters and how those letters sound when they’re combined will help children decode words as they read. Understanding phonics will also help children know which letters to use when they are writing words. Phonics involves matching the sounds of spoken English with individual letters or groups of letters. For example, the sound k can be spelled as c, k, ck or ch. Teaching children to blend the sounds of letters together helps them decode unfamiliar or unknown words by sounding them out. For example, when a child is taught the sounds for the letters t, p, a and s, they can start to build up the words: “tap”, “taps”, “pat”, “pats” and “sat”. Song of Sounds At Felbridge, we use a systematic phonics teaching programme called ‘Song of Sounds.’ Song of Sounds is a foundation for reading and writing. It teaches all of the letter sounds in an enjoyable and practical way and, like many other phonics programmes, is designed to support children to read and write words by blending and segmenting the taught sounds. Song of Sounds- the song! How will my child learn the letter sounds? At Felbridge Primary School, children in Year R will begin to learn all the letter sounds as soon as they start school. Each letter sound has an action and a song which will help your child to remember the letter that it represents. Children work through the initial sounds at a surprisingly fast rate; one letter sound will be taught each day, and as your child becomes more confident, they will find that the actions are no longer necessary. The letter sounds will not be taught in the order of the alphabet; they have been chosen in groups of four letters at a time because they then enable a progression through the recognition of simple words, starting with three-letter ‘CVC’ (consonant-vowel-consonant) words such as c-a-t and t-a-p. I’ve got an older child. Is Song of Sounds different? If you’ve got an older child, don’t worry- reading hasn’t changed! We have adopted the programme as a way of engaging children even more with their early learning in phonics, but the books we send home and the approaches to sounding out words are broadly the same as those used to learn early reading skills by Key Stage 2 children before the introduction of Song of Sounds. Our annual reading evening in September will support you to help your child when reading at home, so please don’t worry if this is new to you. Teaching sounds and ‘tricky words’ We teach the initial sounds in the order below, across 4 stages as part of our Song of Sounds programme. You can use this grid to help support your child by pointing at each sound and asking your child what it is. Their confidence and speed will progress much faster than you think, but try not to move them on faster than they are being taught the sound groups in school. Stage 0 covers pre-school, encouraging children to listen to sounds around them and develop their sound knowledge. Stage 1 is covered in Year R, starting with these sounds which will be taught in the order below: s, a, t, p i, n, m, d g, o, c, k ck, e, u, r h, b, f, ff, ll, ss The second phase of Stage 1 adds the following sounds and ‘digraphs/trigraphs’ – a combination of two or more letters that represents a single sound: j, v, w, x y, z, zz, qu ch, sh, th, ng ai, ee, igh, oa, oo, ar, or, ur, ow, oi, ear, air, ure, er During Phases 3 and 4 of the Stage 1 phonics programme in Year R, we start to add ‘tricky words.’ These are words which cannot be ‘sounded out’ but instead will need to be learnt by having lots of practice. These words are introduced gradually as children become confident and secure in the basic sounds introduced earlier. Again, you can use the grid below to practise, but try not to rush ahead! Phase 3 Tricky Words Phase 4 Tricky Words Children will move on to Stages 2 and 3 in school years 1 and 2, during which they will encounter more complex sounds and patterns and continue to build their phonetic knowledge to give them the skills they will need to write with increasing vocabulary in the upper year groups.
<urn:uuid:d84e178b-c04b-400e-bc26-b5a3524a2691>
CC-MAIN-2023-50
https://www.felbridgeprimary.com/song-of-sounds/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.946646
1,083
3.859375
4
Fixed cost refers to the expenses that a company or business incurs that do not vary with the level of production or sales. These costs remain constant regardless of the volume of goods or services produced by the business. Examples of fixed costs include rent or lease payments for a building, salaries of permanent employees, insurance premiums, property taxes, and other expenses that are necessary for the operation of a business but do not vary with the level of output. Fixed costs are different from variable costs, which increase or decrease in proportion to the level of production or sales. By understanding and managing fixed costs, businesses can better plan their expenses and determine the level of revenue they need to generate in order to break even or make a profit.
<urn:uuid:614ebb71-26d5-4b1f-bee5-4e481257aef4>
CC-MAIN-2023-50
https://www.fundandflow.com/what-is-fixed-cost/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.949995
144
2.984375
3
In this quick tutorial, we explain how to use some of the sheet metal tools in SOLIDWORKS, specifically the Fold and Unfold tools. First, let’s set up our base flange, being sure to have a fully defined sketch to start. After creating a base flange, find the Fold and Unfold tools in the Sheet Metal tab in the CommandManager. It is often much easier and more efficient to work on sheet metal parts in the flat. These tools will help us to do that. Let’s start with the Unfold tool. SOLIDWORKS will prompt us to choose a Fixed Face. Ensure that the Fixed Face chosen remains constant when using the Fold and Unfold tools. I prefer to use one of the main faces of the base flange. After selecting the Fixed Face, the Unfold tool will need us to choose which bends to unfold. Choose individual bends or use the Collect All Bends button to select all bends on the flange. For this example, we will choose an individual bend. Once all desired bends have been selected, click the green check mark to complete the Unfold. This will put an Unfold in the FeatureManager Design Tree. Now that we have Unfolded this bend, we can create a sketch on its surface, sketch a rectangle, and then use Extrude Cut to cut and hole into the base flange. Use the Fold tool to refold the unfolded bend. Notice when selecting the Fold tool, it also requires a Fixed Face, but this time, it automatically selects the same Fixed Face from the Unfold previously performed. This helps to keep consistency between the two tools. In the Fold tool, pick the bends to fold by either manually selecting the individual bends or using the Collect All Bends button. In the Fold tool, this button selects all bends previously unfolded. By clicking the green check mark, the Fold will be completed. As you can see, this adds a Fold to our FeatureManager Design Tree, and the cut that we did while the bend was unfolded has now folded with our bend. There are other methods for generating this cut after the bend, but by using the Unfold tool to flatten the bend and then generating the cut, we know that the dimensions of the cut are accurate and not distorted by the bend when we generate a flat pattern. I hope this article helped explain SOLIDWORKS sheet metal fold and unfold tools. Check out more tips and tricks listed below. Additionally, join the GoEngineer Community to participate in the conversation, create forum posts, and answer questions from other SOLIDWORKS users. Want to take your SOLIDWORKS skills to the next level? Enroll in the official SOLIDWORKS Sheet Metal training course. This course teaches designers how to build standalone sheet metal parts and convert conventional parts to sheet metal in assembly context. Both online and in-person classes are available. SHORTCUTS ⋅ MOUSE GESTURES ⋅ HOT KEYS Our SOLIDWORKS CAD Cheat Sheet, featuring over 90 tips and tricks, will help speed up your process. GoEngineer delivers software, technology and expertise that enable companies to unlock design innovation and deliver better products faster. With more than 35 years' experience and tens of thousands of customers in high tech, medical, machine design, energy and other industries, GoEngineer provides best-in-class design solutions from SOLIDWORKS CAD, Stratasys 3D printing, Creaform & Artec 3D scanning, CAMWorks, PLM, and more Get our wide array of technical resources delivered right to your inbox. Unsubscribe at any time.
<urn:uuid:547866e5-2e45-4a8f-9184-b8cec9d42507>
CC-MAIN-2023-50
https://www.goengineer.com/blog/solidworks-sheet-metal-fold-and-unfold-tools-explained
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.884327
770
3.15625
3
Domestic waste combustion process: Burning household waste occurs in large ovens, after which it is cooled with water or air. The resulting product is a slag mass called IBA: Incineration Bottom Ashes. It consists mainly of two materials: metal and mineral fractions. Incinerator slags are usually first buffered (ageing) and then upgraded in what is called an SCF (slag cleaning furnace). The metal fraction consists of both ferrous and non-ferrous metals. Hereby it is important to recover as much metal as possible, creating a pure mineral fraction that is used as secondary building material. What are incinerator slags? Incinerator slags are a product of the waste-to-energy (WtE) process in which household waste is burned to generate warmth and electricity for households, for example. It is a grey, cement-like mass, coarse in texture. - minerals: 85 - 90% - ferrous / iron containing: 4 - 10% - non-ferrous: 2 - 5% - specific mass: 1,000 - 1,500 kg/m³ - humidity: 0 - 30% Separating ferrous metals Ferrous metals are easy to separate with overband magnetic separators. The relatively pure separated ferrous fractions can then be fed directly back to the metal manufacturing industry (iron smelters / iron producers / blast furnaces) as secondary raw materials. The finer fractions contain so-called magnetic slag, these are nuggets consisting of mineral and metal. Magnetic slag can be best separated with a 1,800 or 3,000 gauss head roller magnet. Using the band speed and the position of the separation bulkhead, the grade of the material can be determined very accurately. Ferrite overband magnetic separator Eddy current separation The eddy current technology separates non-ferrous metals as a metal mix. This metal mix can consist of aluminium, copper, zinc, brass, stainless steel, lead, nickel, gold, silver, palladium, platinum, magnesium and titanium. The drier the material, the more easily the metals can be separated. The finer the fractions are, the more difficult it is to separate the non-ferrous metals. Often, in the fine fractions, we place multiple eddy current separators in cascading order. This generates an optimal separation yield. The first machine, for example, focuses on the bulk metals and the aluminium (LNF, Light Non-Ferrous metals). The second eddy current focuses on the heavy metals (HNF, Heavy Non-Ferrous), including the copper parts and wires. Remove non-ferrous particles with eddy current separator
<urn:uuid:77bffd19-0315-4ac2-9e04-eb49c2fee4b2>
CC-MAIN-2023-50
https://www.goudsmitmagnets.com/en/industries/recycling/ash-slag
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.854052
570
3.296875
3
Landsbyhistorie: Humble Station Langeland Railway was active from 1911-1962 Humble station was part of Denmark's well-developed railway network Denmark grew smaller from 1847 towards the middle of the 20th Century, or so it seemed. During this period a complex network of railroads was constructed across the country. This made it possible to transport goods and people more quickly over greater distances. Langeland got its first and only railway in 1911. The construction of the railway tracks began in 1909 and two sections were laid down: One east-westbound between Rudkøbing and Spodsbjerg, and one north-southbound between Rudkøbing and Bagenkop. Plans to establish a Northbound section to Lohals were never carried out. From 1910-1911 the 13 station buildings on the Langeland railway were built. All the station buildings on the railway were designed by the architect Helge Bojsen-Møller in a simple yet decorative style. However, local craftsmen took care of the construction work itself. Humble station was built in the southern part of the town by Carl Nielsen from Kædeby and P. Rask from Humble. The railway was opened on the 4th of October 1911. In the following 51 years, the Langeland Railway was the most important means of transportation on the island. Combined with the many ferries to and from the island, the railway brought both the Danish and the European mainland closer to Langeland. However, after World War II, the railway was in a deteriorating condition, and the increasing number of private cars made the railway redundant. In 1962 the railway closed. After this, Humble station housed the municipal office and, later on, one of the island’s asylum centres. Source: Humble, Lindelse, Tryggelev-Fodslette Lokalhistoriske Arkiv.
<urn:uuid:ee0785df-8b9b-43e3-88c3-b5de25bf9e1b>
CC-MAIN-2023-50
https://www.govisitlangeland.de/langeland/planen-sie-ihre-reise/landsbyhistorie-humble-station-gdk1136388
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.979179
401
2.65625
3
Апликација и стандардна лента за агол Angle steel is widely used in various building structures and engineering structures, such as house beams, bridges, transmission towers, lifting and transportation machinery, ships, industrial furnaces, reaction towers, cable trench brackets, power piping, busbar bracket installation, container racks and warehouses Shelves etc. Mechanical property inspection: ① tensile test method. Commonly used standard inspection methods include GB / T228-87, JISZ2201, JISZ2241, ASTMA370, FOCT1497, BS18, DIN50145, etc .; ② Bend test method. Commonly used standard inspection methods include GB / T232-88, JISZ2204, JISZ2248, ASTME290, ГОСТ14019, DIN50111, and so on. The inspection items for evaluating the properties of angle steel are mainly tensile test and bending test. Indexes include yield point, tensile strength, elongation, and bending compliance.
<urn:uuid:9014bc84-1385-4972-9763-d5fbe8660fba>
CC-MAIN-2023-50
https://www.gspipe.net/mk/Company-news/angle-bar-application-and-standard604
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.773114
254
2.5625
3
Male Babies are prone to NEURO-DEVELOP-MENTAL disease in USA Women who conceived during or after Covid-19 pandemic are prone to risk of giving birth to male babies with neurodevelopment disorder. A study has been carried out in Boston on babies born from 2018 to 2021 illustrate the neurodevelopment disorder within 12 and 18 months of their birth. Male fetuses are on higher risk and sensitive to inflammatory and immune mediated disease exposed in uterus. A study in 2021 showed that there are reduced placental antibodies transferred to male fetus during maternal Covid-19 infection. This may leads to higher rate of developmental abnormalities. Vaccination is the only way to avoid or minimize these abnormalities. However, more study is needed to evaluate the various cause and consequences on both sexes. This is the only initial phase.
<urn:uuid:838d801c-590f-45e8-9622-bab89398c587>
CC-MAIN-2023-50
https://www.gurukirpamedicose.com/web-stories/male-babies-prone-to-neurodevelopmental-disease-in-usa/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.966714
172
2.640625
3
The Ancient of Days The title “Ancient of Days” has been used as a source of inspiration in art and music, denoting the Creator’s aspects of eternity combined with perfection. William Blake’s watercolour and relief etching entitled “The Ancient of Days” is one such example. The Ancient of Days is the title of a design by William Blake, originally published as the frontispiece to a 1794 work, Europe a Prophecy. It shows a figure, the Ancient of Days, crouching in a circular design with a cloud-like background. His out-stretched hand holds a compass over the darker void below. As noted in Gilchrist’s Life of William Blake, the design was “a singular favourite with Blake and as one it was always a happiness to him to copy.” As such there are many versions of the work extant, including one completed for Frederick Tatham only weeks before Blake’s death. Full resolution (767 × 1,092 pixels, file size: 156 KB, MIME type: image/jpeg) Thumos (also commonly spelled “thymos”) (Greek: θυμός) is an Ancient Greek word expressing the concept of “spiritedness” (as in “spirited stallion” or “spirited debate”). The word indicates a physical association with breath or blood. The word is also used to express the human desire for recognition. In Homer’s works, thumos was used to denote emotions, desire, or an internal urge. Thumos was a permanent possession of living man, to which his thinking and feeling belonged. When a Homeric hero is under emotional stress he may externalize his thumos, conversing with it or scolding it.
<urn:uuid:d5a66fff-4733-45b0-900a-fb395afcd785>
CC-MAIN-2023-50
https://www.hawthornfire.com/tag/vision/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.953015
386
2.953125
3
A blood pressure emergency happens when your blood pressure reaches 180/120 or above. You can try breathing exercises and drinking water to help lower your blood pressure within 5 minutes. But you may also need to call 911 or seek emergency medical help. A blood pressure emergency occurs when your blood pressure reaches 180/120 or above. This can happen with or without causing symptoms. When it happens without symptoms, it’s typically safe to wait about 5 minutes. You can then take a second blood pressure reading to see if your blood pressure has come down. Methods such as breathing exercises, lying down flat, cold showers, and drinking water can sometimes help to quickly reduce your blood pressure at home. But when your blood pressure of 180/120 or above causes symptoms, it’s not safe to wait at home. This is a medical emergency that needs attention. Read on to learn more. A blood pressure emergency happens when your blood pressure reaches 180/120 or higher. This is also sometimes referred to as a hypertensive crisis, according to the But not every significant blood pressure situation rises to the level of an emergency. There are two types of blood pressure crisis: - Hypertensive urgency: This happens when your blood pressure is 180/120 or above, but you don’t have any symptoms along with the high reading. - Hypertension emergency: This happens when your blood pressure is very high and you’re experiencing symptoms. When this happens, it’s a medical emergency. It’s important to call 911 and seek emergency care. If your blood pressure is 180/120 or higher and you’re not experiencing symptoms, you can wait about 5 minutes before taking another reading. If your reading hasn’t gone down in those 5 minutes, but you haven’t developed symptoms, your blood pressure emergency would be classed as hypertensive urgency. This type of blood pressure emergency needs medical attention, but it rarely requires hospitalization. You might experience several different symptoms during a hypertensive emergency. If you experience these symptoms and have a blood pressure reading of 180/120 or higher, it’s important that you seek urgent medical care. Symptoms of a hypertensive emergency include: There are some medications that can cause your blood pressure to rise. Exactly how much that raises your blood pressure depends on a variety of factors, such as your age, genetics, and overall health. Medications that could raise your blood pressure include: - certain antidepressants - immunosuppressant medications - birth control pills and other hormonal medications - migraine medications - nonsteroidal anti-inflammatory drugs (NSAIDs) - acetaminophen (Tylenol) - allergy medications - asthma medications - over-the-counter (OTC) cold medications - thyroid hormone medication - performance-enhancing steroids - the weight loss medication phentermine - supplements such as black licorice and Ephedra Certain medications have a higher risk of increasing your blood pressure when they’re taken together. For instance, taking an OTC cold medication and an antidepressant on the same day can cause a spike. Additionally, substances such as caffeine, nicotine, and alcohol are known to raise blood pressure. Consuming any of these along with medications linked to an increase in blood pressure may If you’re experiencing a blood pressure spike without any other symptoms, you can try these methods at home to help bring down your blood pressure quickly but temporarily: - Practice breathing exercises: Taking slow and deep breaths can help bring down your blood pressure. Try taking a deep breath and holding it for several seconds before letting it out. You can do this for a few minutes to help your body relax. - Lie down: Lying down can also help you relax. It can help your blood flow and bring down your blood pressure. Try lying down for about 10 minutes for the best results. - Take a bath or shower: Water can help soothe muscles and reduce stress. Cold water can constrict your blood vessels, and while that may initially raise blood pressure, it will lead to a later reduction in blood pressure during rewarming. - Drink water: Dehydration can spike your blood pressure. Drinking water can help bring it back down. While options such as sports drinks can sometimes be useful for hydration, they often contain additives, such as sodium, which At what blood pressure should you go to the ER? It’s important not to handle a blood pressure emergency at home if your blood pressure is 180/120 or higher and if you’re experiencing symptoms. This is a serious medical emergency that requires quick, expert help. In this situation, it’s not safe to wait 5 minutes so that you can take a second reading or try to bring down your blood pressure on your own. Calling 911 or having someone drive you to the nearest emergency room is the best response. A blood pressure emergency occurs when your blood pressure reaches 180/120 or higher. When this happens without any accompanying symptoms, it’s safe to wait 5 minutes before taking a second blood pressure reading. Sometimes, methods such as deep breathing exercises and drinking water can help bring down your blood pressure quickly. However, If your blood pressure reading is 180/120 and you’re experiencing symptoms such as blurry vision, chest pain, shortness of breath, numbness and tingling, and difficulty speaking, it’s crucial that you call 911 or have someone drive you to the nearest emergency room.
<urn:uuid:0ec18dd7-26ad-48e8-994f-b5b715d97927>
CC-MAIN-2023-50
https://www.healthline.com/health/high-blood-pressure/emergency-treatment-for-high-blood-pressure-at-home
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.920367
1,151
3.140625
3
Nosebleeds in children are not uncommon. While they usually mean no harm, experts at KK Women's and Children's Hospital tell you what to expect, and when you should see a doctor. Children usually bleed from the superficial and thin blood vessels at the front portion of the nose on the septum, just behind the nostrils. Such nosebleeds usually decrease after puberty as the nose lining thickens from hormonal changes. Causes of nosebleeds in kids The most common causes of nosebleeds in children are: - Nose-picking – this may also increase the frequency of nosebleeds Air-conditioning has a drying effect on the nasal lining, and increases the risk of nosebleeds. In rare instances, bleeding disorders or tumours may cause nosebleeds. Treatments for nosebleeds When a child’s nose bleeds, ask him to sit up, lean forward and pinch the lower soft portion of the nostrils together for 5 to 10 minutes, and breathe through the mouth. An ice pack can be placed across the nose-bridge and forehead or the cheek to allow for reflex constriction of the tiny blood vessels. The majority of nose bleeding stops during this time. If bleeding starts again, compression can be applied for another 10 minutes. Sitting upright keeps the nose higher than the heart, and reduces the flow of blood to the bleeding site. If your child’s nose bleeds only once in a few months it is not likely to be of serious concern. However, if it is a regular occurrence i.e. four to five times a month, your child should be reviewed by a specialist to rule out the rare causes – especially so, if your child does not sleep in an air-conditioned environment. Measures to prevent nosebleeds for your child A humidifier can be used to reduce the drying caused by air-conditioning as it may not be practical to avoid sleeping in an air-conditioned room in Singapore’s warm equatorial climate. Advise your child against frequent nose-picking to prevent trauma to the affected area. If all these measures fail, consult an Ear, Nose & Throat (ENT) surgeon who may cauterize (seal off) the affected area with diathermy (a procedure using an electric current, usually done under general anaesthesia). If the child refrains from nose-picking and other predisposing factors are removed, this procedure usually allows for six months to a year of relief from symptoms. The ENT surgeon will also review the child to exclude any serious underlying medical conditions as the cause.
<urn:uuid:2ecb7482-1420-433d-aee4-7de4701e6591>
CC-MAIN-2023-50
https://www.healthxchange.sg/children/childhood-conditions/nosebleeds-children
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.913581
545
3.109375
3
Food wastes are foods fit for consumption yet discarded for reasons such as spoilage, shrinkage resulting to poor quality of the ingredient. In every household, food waste is existing which includes ingredients, vegetables, fruits, grains, among others, being left to rot or expire, recipes that are not consumed and spoiled. Tp counter the issue of food waste in our individual household, here are the 7 tips for reducing food waste. * Do groceries wisely. It is not wise to buy too much groceries because people tend to consume less when having too many foods available. Buy what you only need for a week-span and think of recipes which you can utilize all the stocked ingredients in your pantry. * Store foods properly. After shopping groceries, we tend to put everything in one place to rest which is not advisable. Fruits, vegetables must be separated from frozen foods, wrap the greens in a paper towel to preserve its freshness and food better left out of the refrigerator must be placed in a dry place. * Pickle if necessary. Excessive amount of fresh foods can be a headache. To prevent, pickle the vegetables. Fermenting can preserve food even more, creating more flavors. * Be creative. Leftover food can be used to make a new recipe. With this, you will not feel bored eating the same dish. * Do composting. When food cannot be consumed regardless of you trying to preserve them, compost them. These biodegradable items can be very helpful to our environment. * Consume less attractive food. Although looks appeals more to us to consume a food, it is advisable to eat food despite the appearance, so long as the food is fine. * Build connection. By knowing what the food and how the food in front of you was grown, you will appreciate more food has to offer.
<urn:uuid:44843c7e-f67f-4bbf-85a6-fee66ae5c503>
CC-MAIN-2023-50
https://www.healthyandsports.com/tips-to-transform-food-waste-to-something-useful/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.957921
378
3.375
3
Beas Dev Ralhan is the Chief Executive Officer of Next Education India Private Limited, a technology-driven education enterprise, headquartered in Hyderabad. Beas co-founded this educational organisation in 2007 along with Raveendranath Kamath, an IIT Kharagpur alumnus. The Indian education system has always laid emphasis on a generalised approach to assessments, but times have changed and 21st century India has witnessed a lot of transformation in the education sector ranging from digital classrooms, e-learning platforms to personalised learning and assessment. Among other technology-driven education solutions, the idea of personalised assessments is gradually being accepted. The integration of artificial intelligence with the process of creating assessments is helping us realise this dream. Presently, AI-powered adaptive assessments are considered as one of the finest tools for assessing and evaluating students’ academic performance. Adaptive assessments – adding a new dimension to assessments Adaptive assessment is artificial intelligence (AI) and machine learning (ML)-based online test. The computerised-based test starts with questions of medium difficulty. Based on the response by the student, the difficulty level of the questions is either increased or decreased. These tests are designed in such a way that they stop when a certain level of score precision or psychometric degree is achieved. Personalised evaluation approach to support student outcome The one-size-fits-all method of assessment leads to poor academic performance in students who are unable to achieve a set benchmark and those who find it difficult to challenge their abilities. In such a scenario, adaptive assessments ensure that students are tested based on their intellect and level of understanding. Therefore, it acts as a morale booster since the chances of discouragement are reduced. Adaptive assessments have many advantages. Given below is a closer look at how it is beneficial in today’s teaching-learning environment. Benefits for students Facilitates easy identification of learning zones: Adaptive assessments provide students questions based on their knowledge and understanding. With the help of adaptive assessments, students can easily understand where they are lacking in terms of conceptual clarity. If a student is not capable of giving answers to a particular type of questions, he or she can focus more on that particular area. Promotes focussed learning: Once a student identifies his/ her weaker areas, he or she can focus more on those areas. In this way, learning becomes more streamlined and goal-oriented with adaptive assessments. Provides a fair judgement of the academic progress: With the help of adaptive assessment reports and analytics, a student’s academic progress can be measured thoroughly. Based on the scores and ranking, students get a clear picture of their academic performance vis-a-vis their peers. Fosters self-learning: As per the algorithm of adaptive assessments, every student gets different sets of question papers, this helps learners to stay motivated and driven in terms of finding out answers of different questions, thus promoting self-learning. Benefits for teachers Provides class-wise and student-wise performance reports: Adaptive assessment reports enable teachers to analyse class performance with respect to global test-takers. It also helps them to compare students’ scores on the basis of previously recorded statistics. Enables faster identification of learning gaps in students: Teachers will get detailed insight on each student’s performance which can help them identify the learning gaps and design personalised learning paths for every student. Promotes hassle-free creation and evaluation of assessments: Since adaptive assessment is based on artificial intelligence (AI) and machine learning (ML), it helps teachers stay relaxed as test creation and evaluation is no longer a tedious and time-consuming process. Undoubtedly, adaptive assessments streamline the process of assessment and evaluation of students and empower teachers to measure the disparities in learning and bridge the gaps easily. Therefore, it is important for schools and educational institutions to introduce adaptive assessments to meet every student’s learning needs and provide 21st-century education. More About Beas Dev Ralhan Before Next Education, Beas worked as an entrepreneur, investment manager and consultant for around a decade in various firms. In recognition of his immense contribution to the K–12 education segment, CII (Southern Regional) bestowed upon him the ‘Emerging Entrepreneur’ award in 2015. He also received the Indian Education Leader award at the 7th World Education Summit, 2016. Under Beas’ leadership, Next Education has also begun to secure a foothold in the Middle East.
<urn:uuid:e0333a9c-aff9-4cb7-bb38-3ae82084f7a4>
CC-MAIN-2023-50
https://www.highereducationdigest.com/how-are-adaptive-assessments-more-relevant-in-todays-time/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.953742
919
3.328125
3
Maryland has implemented several literacy policies aimed at improving reading proficiency among its students. The state's approach to literacy education focuses on evidence-based instruction, early intervention, and support for struggling readers. One key policy is the Maryland College and Career-Ready Standards, which outlines the skills and knowledge that students need to develop in order to be successful readers, including phonics, fluency, vocabulary, and comprehension. Maryland provides training and support for educators in evidence-based literacy practices, such as explicit instruction and the use of assessment data to inform instruction. The state has established the Maryland Literacy Association to provide guidance and support to educators and promote evidence-based literacy practices. Maryland uses a statewide assessment, the Maryland Comprehensive Assessment Program (MCAP), to monitor student progress in reading and identify areas where additional support is needed. The state's Response to Intervention (RTI) framework provides a systematic approach to identifying and supporting struggling readers, with tiered levels of intervention based on student needs. The Maryland Department of Education also partners with local organizations and agencies to promote literacy development through initiatives such as the Maryland Early Literacy Initiative and the Maryland Family Engagement Network. These programs aim to support literacy development among students and families, particularly those in low-income communities. Additionally, the state has established the Maryland Ready to Read Act, which focuses on promoting early literacy development among young children in the state. Maryland Student Score Gaps: This represents a decline from the 2019 percentage of 4th grade students not reading at the proficient level which was 65%. In 2022, Black students had an average score that was 29 points lower than that of White students. This performance gap was not significantly different from that in 1998 (34 points). In 2022, Hispanic students had an average score that was 40 points lower than that of White students. This performance gap was wider than that in 1998 (18 points). In 2022, male students in Maryland had an average score that was lower than that for female students by 5 points. In 2022, students who were eligible for the National School Lunch Program (NSLP) had an average score that was 32 points lower than that for students who were not eligible. This performance gap was not significantly different from that in 1998 (30 points). Information from the NAEP website for 2022 4th grade reading scores. MD EVIDENCE-BASED CHAMPIONS MD EVIDENCE-BASED ORGANIZATIONS These organizations are committed to promoting evidence-based reading practices, providing professional development opportunities for educators, and supporting students in developing strong reading skills.
<urn:uuid:20f47996-6a6b-46c9-a989-837424afd826>
CC-MAIN-2023-50
https://www.hopevilleadvocacy.com/md
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.966532
527
3.4375
3
During the Capitanian age 260 million years ago, the oceans suffered a drastic loss of oxygen causing, or perhaps amplifying, widespread global extinctions. Then 3 million years later the same thing happened again, sediment records reveal. The findings could explain a major point of confusion about the Permian period, a time overshadowed by its catastrophic ending in the greatest mass extinction event of all. The Earth has suffered five agreed-upon mass extinctions when a large proportion of the planet’s life died out. We are probably in the early stages of a sixth, brought on by our own recklessness. There have, however, been many other points in the Earth’s history where species disappeared much faster than they were replaced, and palaeontologists have long debated whether any of these deserve to be considered mass extinctions as well. A particular focus has been events at the end of the Capitanian age (also known as the end-Guadalupian). According to some estimates, species loss at this point was worse than when the asteroid killed the non-avian dinosaurs, or indeed two earlier mass extinctions. These estimates remain debated, however, and a new study suggests this may be a consequence of mixing up two events. A team led by Dr Huyue Song of the China University of Geosciences measured uranium isotope ratios in marine sediments deposited during the Guadalupian stage 272 to 259 million years ago in what is now the South China Sea. Marine microbes convert uranium (VI) to uranium (IV), but process uranium 235 and U-238 slightly differently. When a decline in ocean oxygen levels causes a microbial die-off this is reflected both in lower uranium concentrations in seawater and a shift in the ratios of the two main isotopes. Although the change in isotope ratio is tiny – just 0.2-0.4 percent – it can still be read in rocks 260 million years old, and from this, Song and co-authors concluded, the oceans became drastically depleted in oxygen twice during the Permian, 262 and 259 million years ago. Each of these would have caused a mass marine extinction, which we would expect to have been replicated on land, taking out species such as Titanophoneus or “titanic murderer”. The authors blame immense volcanic eruptions, like those suspected of causing the other mass extinctions, the dinosaur-killing one aside. Ash from these eruptions caused short-term cooling, followed by longer-term warming as the ash washed out of the skies and carbon dioxide remained. "Dissolved oxygen has to be taken up by the surface layer and supplied to the deep ocean,” said Professor Thomas Algeo of the University of Cincinnati in a statement. “But warmer water is lower density. When you increase the density differential, you prevent any overturn and there's no way to get dissolved oxygen into the deeper layers." "Today, we are facing several global change issues, including global warming, ocean hypoxia, seawater acidification and biodiversity decline, which are similar to the environmental changes during the Middle Permian biological crisis interval," Song said. The changes today are far less extreme, at least so far, but they’re also probably happening much faster. The Capitanian extinction event is acknowledged as seeing the disappearance of tropical species on a scale to match almost any other global catastrophe. Evidence is much more sparse, however, from temperate and polar latitudes, although even Spitsbergen, the largest island of the Norwegian archipelago Svalbard, has provided support for the view this was a worldwide event. Perhaps part of the reason the Capitanian event has not been fully accepted as a mass extinction is that it has been overshadowed by the unquestioned largest extinction event of all, the end-Permian, also known as the Great Dying. Confusion between the two events may have also played a part. Although volcanic eruptions have been the primary suspect, a confirmed cause has also been lacking until now. Why the Earth should have suffered three such devastating eruptions in the space of 10 million years remains unknown. The study is published in Earth and Planetary Science Letters
<urn:uuid:9e21012d-9787-4533-9676-7b1f00908c67>
CC-MAIN-2023-50
https://www.iflscience.com/suspected-mass-extinction-was-actually-a-volcanic-double-punch-3-million-years-apart-68387
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.961431
865
3.78125
4
Scientists have detected a dramatic excess of gamma rays pouring out from the Sun, which represent the highest-energy light emissions ever detected from Earth’s star. “The sun is more surprising than we knew,” said postdoctoral research associate Mehr Un Nisa of Michigan State University, who worked on the new study published in the journal Physical Review Letters. “We thought we had this star figured out, but that’s not the case.” The unexpected discovery was made by scientists sifting through six years of observations captured by the High-Altitude Water Cherenkov Observatory, also known as HAWC, which has been vigilantly tracking gamma ray emissions ever since it was completed in March 2015. HAWC’s data revealed that our Sun is capable of creating a dramatic excess of super energetic gamma rays that extends beyond what current models of our Sun’s behaviour can explain. For context, visible light emitted by our Sun as a result of the nuclear fusion reaction raging at its heart carries energy the equivalent to one electron volt. However, the gamma rays detected by HAWC registered as carrying anywhere from one trillion, up to almost 10 trillion electron vaults. According to the release from Michigan State University, that makes the gamma rays "the highest-energy light ever observed from the sun". “After looking at six years’ worth of data, out popped this excess of gamma rays,” explained Nisa. “When we first saw it, we were like, ‘We definitely messed this up. The sun cannot be this bright at these energies.’ ” A significant amount of the gamma rays produced by the Sun are created when our star’s atmosphere is struck by charged particles known as cosmic rays. These high energy particles are themselves created during cataclysmic events that take place far beyond the borders of our solar system, such as the death of a star in a dramatic supernova, or as a byproduct of a feasting black hole. Upon being deflected back outwards into space by the Sun’s magnetic field, cosmic rays interact with gasses in the stellar atmosphere, triggering the creation of solar gamma rays, some of which are absorbed by Earth’s dense atmosphere. Back in 2011 NASA’s Fermi telescope revealed the Sun was capable of producing extremely energetic gamma rays, and that the star was creating roughly seven times the number of them than had been expected based on earlier estimations. However, according to the Michigan State University, the Fermi telescope's detections were limited by the capabilities of its gamma ray detector, which could only track particles with energies up to 200 billion electron volts. HAWC, however, has no such limitations, and is capable of detecting gamma rays carrying the energy of trillions of electron volts. Located 13,000 feet above sea level, nestled between the peaks of two sleeping volcanoes near Puebla, Mexico, HAWC Is about as far from a conventional telescope, aesthetically speaking, as you can possibly get. It doesn’t have the cylindrical design of the venerable Hubble Space Telescope, nor does it boast the golden mirrors and reflectors of NASA’s origami-like James Webb Space Telescope. Instead, HAWC Is made up of a collection of 300 water tanks filled with roughly 60,000 metric tons of purified water. When gamma rays strike Earth’s atmosphere they break down into fragments of light and lower energy particles known collectively as ‘air showers’. Upon coming into contact with the water tanks, the particles create light in the form of Cherenkov radiation, which is then detected by HAWC’s instruments. Alongside gathering readings as to the incredibly energetic nature of the gamma rays, the HAWC data also revealed that they had a tendency to occur when the Sun is experiencing a relatively dormant phase of its 11-year activity cycle. Moving forward, scientists will be looking to address the question as to how the Sun's magnetic field shapes interactions with the cosmic rays, giving rise to the high energy gamma rays. “This shows that HAWC is adding to our knowledge of our galaxy at the highest energies, and it’s opening up questions about our very own sun,” said Nisa, one of almost 100 scientists who contributed to the paper. “It’s making us see things in a different light. Literally.” Image Credit: NASA/SDO Anthony is a freelance contributor covering science and video gaming news for IGN. He has over eight years experience of covering breaking developments in multiple scientific fields and absolutely no time for your shenanigans. Follow him on Twitter @BeardConGamer
<urn:uuid:85fe8413-3f19-4771-b6d3-d0855347a25e>
CC-MAIN-2023-50
https://www.ign.com/articles/scientists-spot-super-high-energy-gamma-rays-coming-from-the-sun/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.956422
974
3.671875
4
mouse responding to light A newly created set of light-sensitive proteins grants scientists unprecedented control over the brain’s biochemistry, potentially shedding light on addiction and other complex neural processes. To demonstrate the potential of this novel molecular toolbox, researchers from Stanford University engineered mice to carry light-sensitive proteins in the brain’s reward center, which responds to drugs of abuse. Using pulses of light delivered directly to the brain, researchers were able to induce a druglike state, ultimately conditioning the mice to behave like drug-addicted animals. “Drug addiction is one of the leading causes of disability worldwide, and it all funnels through the reward system,” says senior researcher Karl Deisseroth, a bioengineer and psychiatrist at Stanford, who frequently works with drug-addicted patients. Addiction is immensely difficult to treat, in part because drugs create such potent and stable changes in the brain’s reward system. “If we can understand better what those internal states are and how they become so stable–which we started to scratch the surface of in this paper–maybe we can develop more effective and potent therapies for substance abuse,” he says. Researchers created hybrid proteins by fusing the gene for a light-sensing pigment normally found in the eye to the genes for various members of a family of receptor proteins. The hybrid proteins sit in the cell membranes of neurons, with the light-sensitive portion protruding from the cell; when it absorbs photons of a certain wavelength, it changes shape, triggering the intracellular portion of the protein to launch a cascade of biochemical reactions inside the cell. Deisseroth’s team had previously engineered light-sensitive proteins that triggered neurons to fire. But this new system is more specific: rather than stimulating the entire neuron, it targets individual signaling pathways within the cell. The researchers can control different pathways by selecting the intracellular domain from a diverse palette of existing signaling proteins and pairing it with the light-sensitive proteins. “This allows us now to access a whole new dimension of cell states and brain states that we couldn’t before,” says Deisseroth. Researchers used a virus to deliver genes encoding the hybrid proteins, dubbed optoXRs, to the animals’ nucleus accumbens, a brain region that responds to pleasurable stimuli, such as food, sex, and drugs. Each mouse was allowed to roam freely through a series of adjoining chambers, one of which was preselected as a reward room. Whenever the mouse entered the reward room, a researcher fired a pulse of light through a fiber-optic cable into its nucleus accumbens, setting off whatever biochemical cascade corresponded to the particular optoXR it carried. This setup is commonly used to study addiction: when a drug such as cocaine or amphetamine is consistently administered in the reward room, a mouse learns to associate that room with the reward and later chooses to spend most of its time there. “What we found, very strikingly, was that this worked,” says Deisseroth. One of the optoXRs, built from a receptor protein that normally responds to adrenaline and noradrenaline, produced results much like those seen with drug-based rewards. When loosed after training, mice with this optoXR strongly preferred to spend time in the reward room, where they had received light pulses activating their nucleus accumbens. The results of the study were published this week in Nature. Many of the same proteins that Deisseroth’s team activated with light can be targeted by drugs. But light has a number of advantages over drugs, says Michael Häusser, a professor of neuroscience at University College London, who was not involved in the research. While drugs take time to work and linger after administration, light allows for exquisite control over timing. And while drugs don’t pick and choose which cells to affect, optoXRs can be genetically engineered to be expressed in only a specific type of cell. The hybrid proteins represent a new molecular toolbox with applications beyond drug addiction and the brain’s reward system. “There are all kinds of really cool games you can play with these new molecular tools to look at aspects of signaling pathways and how they interact,” says Häusser. For example, they open the door to studying more mysterious receptor proteins, which can’t be activated pharmaceutically and whose function is not well understood. “For some of them,” says Häusser, “our toolbox for manipulating them is limited. So this gives us a fantastic new handle on these receptor classes, and allows us to manipulate them in a really powerful way.”
<urn:uuid:b05afc16-4974-48f3-8beb-029b7d78cf50>
CC-MAIN-2023-50
https://www.impactlab.com/2009/03/19/hooked-on-light-could-reveal-the-biochemistry-of-addiction/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.942799
975
3.109375
3
Updated: May 10, 2022 Electric vehicles have soon become the new reality of the Automotive industry. Blame the skyrocketing prices of petrol/diesel or increasing CO2 emissions, or depleting fossil fuels around the globe; anything or everything seems to have only led to a quick evolution of the automotive industry. Roads have gotten filled with EVs, even way before the anticipated time. And within days after entering the markets, this technology has shown wild-fire like advancements. Talking about the technology, the auto industry is already in the era where a standard vehicle also uses 100+ ECUs for proper functionality; with EVs coming into the picture, this number has increased multi-folds. With this massive turn in technology, the introduction of rechargeable batteries, and the addition of many other technically complex elements, the need to collect data for making these vehicles perform better has also increased. An electric vehicle needs a data logger way more than a conventional vehicle, as a more significant number of ECUs means massive data to calibrate. Various parameters need to be monitored for better performance, such as SOC, SOH, voltage, current, charging voltage, charging current, cell voltages, cell temperatures, and something that aids and becomes an integral part of the BMS of the vehicle. This enables the user to analyse data and troubleshoot to improve their vehicle’s performance. Main features to keep in mind while choosing a data logger for an EV: The existing market of datalogger technology is also colossal today. There exist many such loggers which might look promising enough to fulfil the basic criteria. But for selecting one such logger that does it all, one needs to keep a few important pointers in mind. Configuration: for any device, the most critical is the configuration around which it is built. There seems less logic in paying for something not required or paying for a device that misses out on any of the features you are looking for. The most important features to look out for in an electric vehicle data logger can be GNSS, gyroscope, accelerometer, collection of battery temperatures, embedded eMMC, cloud storage, open platform, etc. Accessibility: the other major factor to keep in mind is the easy accessibility of the device. Using something with a great configuration might become useless if the user struggles to put the device to work. Various accessibility functions to consider when buying a logger can be easy usage, hassle-free interfacing, freedom to design the config etc. Some advanced features must also support multiple file formats, triggers, live-data viewing, Wakeup-on CAN/Wake-on moment, sleep modes, start/stop logging flexibility, etc. Reliability: now, along with the above mentioned two features, reliability is equally important. What if a product had it all, worked the way you wanted it to but gave you inaccurate readings? Factors that make a device reliable enough can be accuracy, cost-effectiveness, compactness, no data loss, robustness, security etc. Reading these points may trick you into thinking, “wait, which logger in the world will have all these?” but what if we told you that, Influx offers you just exactly what you need. EV Data logging made simple with ReXgen Series: ReXgen Series has been there for quite some time to take care of the regular conventional vehicle. May it be two, three or four-wheelers, our data loggers from the ReXgen Series have taken care of all their data logging needs. And with the automobiles transforming into electric beasts, ReXgen has also transformed to support them completely. ReXgen dataloggers not only support the features and characteristics mentioned above but many more. ReXgen, in a nutshell, is a device that will support it all. A cost-effective solution that: Plug & Play - Easy configuration. Robust & IP65 rated. Easily Mountable & compact ergonomic design. Low power consumption & Wake on CAN/Signal Feature. Supports up to 32GB of eMMC storage. Supports CAN/CAN FD. Capable of telematics and fleet management. Offers Open API. Works as a pass-thru device. Supports multiple file formats. CAN frame error detection. Apply triggers to start/stop logging by defining your custom time. Supports 4G (LTE) connectivity to transfer data to the cloud. (AIR) Encrypts data logs using Advanced Encryption Standard (AES). Enables Locking of the device using RSA data security. (To know about more features of the entire ReXgen series, Click here.) The other most incredible characteristic that compliments the existence of the ReXgen data loggers is the ReXdesk software. ReXdesk is entirely free and dedicated software explicitly designed to support ReXgen throughout its life cycle. It enables the user to prepare and configure the ReXgen loggers for data logging. Using ReXdesk, the user can retrieve, convert, view live data, etc. The user can also program the ReXgen device using third party software with the help of the open XML file available. Also, the open API feature lets the user configure the device according to their need. Leading to higher gains, business expansions, better time utilization and lesser need for support. Contact us for more information on ReXgen AIR CAN to CLOUD Logger.
<urn:uuid:deaffd2d-a959-493a-afde-27de881f4c5d>
CC-MAIN-2023-50
https://www.influxbigdata.in/post/electric-vehicle-can-bus-logger-ev-logger
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.929984
1,136
2.546875
3
Posted on: 13th December 2017 by Richard Keyte This is the first of two blogs about the challenges of measuring toughness in aluminium extrusions. What is toughness? Toughness is a material’s ability to resist low ductility fracture. In other words, it can accommodate plastic deformation without catastrophic failure. Toughness is a product of alloy selection and an optimised thermo-mechanical processing route. A microstructure that is optimised for toughness needs to accommodate plastic deformation. However, high strength materials are designed to resist deformation. Automotive aluminium extrusions Lightweight automotive structures typically contain both aluminium sheet and aluminium extrusions. The front of the vehicle, where impact protection is a key feature, often contains high strength 6000 series extrusions. These extrusions can have tensile stress values in excess of 400MPa. The fabrication of these structures may involve mechanical fastening (self-piercing rivets), fusion welding and/or adhesive bonding. All these methods require machining and forming of the aluminium extrusions to generate the required joint geometry and form of the vehicle. It is inevitable that, no matter how good the design or how conservative it is, machining and joining sheet and extrusions will generate a feature that includes a region of undesirable geometry. An example of this is a notch. Unfortunately, these features will compromise the mechanical properties of the extrusions. The limitations of FEA Typically, simulations by Finite Element Analysis incorporate quasi-static mechanical properties such as proof stress and tensile strength. They also include plastic deformation and strain hardening coefficients, as well as assuming that a material is fully isotropic. However, these basic tests offer little information on how a material performs in the presence of a stress raiser. They also don’t tell us whether the material can sustain high stress levels with discontinuities in the structure. For this we need additional material properties which we can use to asses if any specific material can offer a greater or a lesser fracture resistance or toughness. Conventional fracture toughness Conventional fracture toughness evaluation is based on a material’s ability to sustain or carry a load in the presence of a stress raiser, such as a crack. The tests involve defining a stress intensity factor, K, which describes the stress field around a crack. The crack size (length), sample geometry and applied stress all have an impact on the value of K. The rate at which a crack can move through a structure, or the crack driving force, is related to K. We call this the strain energy release rate, G. These two parameters are more useful than basic uni-axial tensile data. This is because they give an indication as to whether a material can resist unstable crack growth, which could lead to catastrophic failure. K = √EG, where E is Young’s Modulus. Plane strain fracture toughness K1c is a true material property. It relies upon a notched sample of sufficient critical width that the stress field around the notch is contained within the width of the sample. In other words, it cannot deform laterally outwards. Consequently, as the sample thickness changes, so does the stress state and size of the stress field until we reach the critical width. At this point the stress intensity factor, K, becomes relatively stable. Unfortunately, it’s unlikely that you’d find this geometry requirement in automotive extrusions. As already mentioned, the stress field around a notch changes with material thickness. This important criteria will always preclude comparing extrusions of different thicknesses. As a result, subsequent tests are useful for ranking aluminium extrusions against each other, but not for absolute comparisons. Fortunately, 6000 series aluminium alloys do not exhibit unstable crack growth. However, alloys and process routes are changing to meet lightweighting requirements. This means higher and higher tensile strengths and thinner gauges. In addition to this, some vehicle manufacturers are using 7000 series alloys which require specific thermal treatments to improve toughness such as overaging. This justifies looking at a test technique which is compatible with an extruded product form; round bar. We are working on a test at Innoval which is a variation of the short rod fracture toughness test. I will describe this in my next blog, part 2, as well as introducing some of the tests we already use. In the meantime, if you’d like to know more about the material testing we do at Innoval, including our UKAS certified tests, please click here.
<urn:uuid:aaa33895-767c-4b70-b1c5-aa8f227b5020>
CC-MAIN-2023-50
https://www.innovaltec.com/aluminium-extrusions-toughness-blog1/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.925132
945
2.921875
3
Production of Berries in Mexico – A Growing MarketJune 19, 2019 Berries are the fifth largest agricultural product in Mexico, and thanks to the quality and traits they present, they have become one of the most important products for worldwide exports. With close to 62,000 acres sown, the country has many different varieties, including cranberry, strawberry, raspberry and blackberry, the last one being the most important one in the country. Today, the production of berries has reached 60,540 acres across Mexico and is mainly focused in four states. Michoacán is the most important producer with a harvest of almost 41,000 acres, or 70 percent of the total exports, followed by Baja California with 12 percent and Guanajuato with 4 percent. On a worldwide scale, Mexico is the number one producer of blackberries with a whopping 30 percent and an estimated production of 548 thousand tons per year, followed by the United States and China, while the cranberry is produced mainly in Chile and Canada. Among the most important export destinations of the Mexican berries are: the United States, who top the list, followed by the Netherlands, the UK, Italy, Belgium, France, Canada, and Germany, among others. It is important to mention that Mexico is the third berry exporting country worldwide, with an estimated commercial value of $800 million USD. The berry industry in Mexico produces close to 200 thousand jobs per year, which are divided into direct and indirect jobs, where most are created in Jalisco and Michoacan. This agricultural activity generates a economic spillover of around $900 million USD per year. “It’s worth mentioning that at the start of this year negotiations started to increase the markets Mexico exports to and includes China in the mix, with the purpose of increasing agricultural exports and reaching the $100 million USD threshold,” said Mario Alejandro Andrade Cárdenas, Vice President of International Commerce of the National Agropecuary Council (CAN). By Fresh Plaza
<urn:uuid:38156c1d-7650-4385-b63b-bd4e8031ef52>
CC-MAIN-2023-50
https://www.internationalproducegroup.com/production-of-berries-in-mexico-a-growing-market/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.952985
415
2.53125
3
The internet has changed the way we consume media. People can now access content when and where they want, and connected to the right VPN, it’s practically impossible to prevent them from doing so. But the internet isn’t the only thing that’s connected to the network. So are your electronic devices. What this means is that you can’t always trust that your actions will remain private once they’re connected to the internet. To ensure your personal data remains protected, you need to take steps to ensure that it isn’t accessible to people on the network, or anyone else for that matter. What Is A VPN? A VPN is a virtual private network. It creates a private, encrypted tunnel between your device and a VPN server, allowing you to securely access resources that you want to keep private. While there are many different types of VPNs, they all work in the same basic way. When you connect to a VPN, your device will create a secure connection to a server somewhere in the world, and route all of your internet traffic through this private tunnel. This ensures that your traffic is more secure than it would be if it were not routed through a VPN, as it prevents anyone on the network from peeking at your traffic (except for the people you’ve previously authorized). Why Do I Need To Setup A VPN? There are many reasons why you might want to setup a VPN, but here are a few of the more common ones. - To access restricted content that you want to watch but don’t have permission to download. - To prevent your personal data from being tracked online - To ensure your internet traffic is always encrypted and secure - To prevent insecure wireless internet connections from affecting your privacy - To prevent your personal data from being accessed by people online Depending on your needs, you might only need one or two of these reasons. But for the purposes of this article, we will assume that you want to setup a VPN simply because you want to ensure your individual data is always secure and private whenever you use the internet. Which Type Of VPN Should I Setup? This is a common question, and the answer is… it depends. You need to setup a VPN that is secure and private enough to meet your needs. There are several factors to consider, so let’s examine them one by one. - The server location - The encryption protocol - The no-logging policy - The authentication method - How long the VPN will stay connected - How fast and stable the internet connection is - How well the VPN handles torrents All of these factors determine the level of security and privacy that you’re going to get from a VPN. Not all VPNs are created equal, and it’s important to find one that fits your needs. To start, simply search for “VPN” in your favorite search engine and you’ll see a list of results. Now you can begin your search based on the factors mentioned above. Do you need a VPN that is available in Canada? Or would you prefer a US-only server? Consider the speed of your internet connection when deciding which VPN to choose. It should be noted that some VPNs are designed to work only with specific internet connections, so you might have to try a few out beforeyou find one that suits your needs. Keep in mind that nothing stops you from connecting to a VPN server in another country, but you’ll have to pay for this convenience, as most VPNs have either a US or a Canadian server. Where Can I Connect To? This is one of the most important questions to ask yourself before connecting to a VPN. It’s critical that you determine where you’re going to connect to before you set up the VPN, otherwise you’re merely wasting your time. Without proper guidance, you run the risk of connecting to a government-backed “back door” that is silently collecting information on your behalf. For example, if you connect to a Malaysia server, all of your internet traffic is currently routed through this country. There is no way to tell whether or not Malaysia is watching you, or if they’re just acting as a middleman in passing your data along to another government agency. This might seem like a far-fetched scenario, but it’s all too believable considering the increasing number of governmental agreements that allow for the transfer of private data in the name of national security. Is My Privacy Protected By The VPN I’m Using? This is a question that you need to ask yourself before connecting to any type of public Wi-Fi connection, whether it’s at a coffee shop, a hotel or even at a friend’s house. When you’re not connected to a VPN, your personal data is open to anyone that wants to look it. Your Google searches, your emails, your browsing history, and even your physical location can be monitored and collected by third parties. There is no way for you to know whether or not your data is secure, as it depends on whether or not the people around you are willing to help the government monitor your movements and searches. If you’re not sure whether or not your data is secure on public Wi-Fi, it’s usually best to assume it isn’t and connect to a VPN. How Does The VPN I’m Using Handle My Data? Every VPN is different as far as the data that it collects, stores and protects. You need to know what type of data you’re dealing with before you connect the VPN. Some VPNs collect basic usage data, like how many devices you’ve connected to the network and how much data you’ve used. Others retain the contents of all of your emails and web searches as well as the websites that you visit. Still others maintain a record of your physical location when you use the service. It depends on the type of service that you’re using and the type of data that is being collected. What Are The Fees Involved? Fees are always a consideration when you’re deciding where to connect and how to protect your data. It’s not unusual for VPNs to have a monthly fee that is either discounted or waived for the first year. For those that want to remain anonymous, this can be quite the selling point. If you’re not sure whether or not you’ll use the service, it might be best to choose a free trial or to signup for a month then cancel before the end of the term. What About Encryption? Encryption is the process of adding a code to your data that prevents anyone from reading it without permission. Without proper encryption, all of your data is open to potential attackers. Fortunately, most VPNs take this into consideration and use strong encryption protocols that are almost impossible to decrypt. There are, however, a few exceptions such as the “Dark Web” and certain government-backed agencies. To ensure that your data is always secure whenever you use the internet, make sure that your VPN is encrypted too.
<urn:uuid:a7db08ee-776c-4010-bec1-683a3ded6b90>
CC-MAIN-2023-50
https://www.intrapages.com/what-port-i-should-setup-utorant-to-download-movies-when-i-am-connected-to-vpn/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.944225
1,481
2.640625
3
This image can easily be mistaken for a planetary nebula, but it is actually an image of a young star in the midst of formation. L1527 is an embedded protostar within a dark cloud in the Taurus star forming region. The image was captured by the Near-Infrared Camera (NIRCam) on NASA’s James Webb Space Telescope (JWST). L1527 is classified as a class 0 protostar, meaning it is in the earliest stages of star formation; it has an age of approximately 100,000 years. At this stage of star formation, protostars are still embedded within the molecular clouds of gas and dust in which they form from. This young stellar object has many years (possibly millions!) before it comes a star, burning hydrogen to helium in its core. L1527 is still forming within the molecular cloud. At the moment, it is an unstable, small, hot, and puffy clump of gas with approximately 20-40% the mass of the Sun. The young stellar object will continue to grow as it steals material from its surrounding cloud. As it grows in mass, the core of the protostar will compress, growing denser and hotter, until it is finally hot and dense enough for stable nuclear fusion of hydrogen to occur. As the material is falling towards the protostar, it spirals around it. This process creates a dense disk of material surrounding the star. The disk is known as an accretion or protoplanetary disk, which will continue to feed material onto the protostar until it is hot and dense enough for nuclear fusion to begin. This disk will also serve as the birthplace of planets for this burgeoning solar system. The protoplanetary disk for this protostar can be seen in the center of this image as a dark band in front of the bright central region. It is viewed edge-on, or from the side, and it is about the size of our solar system. The protostar is hidden from view; its light is blocked by the very dense protoplanetary disk. Light from the protostar is able to escape from above and below the disk, and we can see that light illuminating the surrounding gas and dust. The molecular cloud glows bright in artificially colored blue and orange light in this image, representing shorter and longer wavelengths of infrared light, respectively. The different colors represent different densities of dust within the cloud: orange light represents the denser regions and blue right represents the more tenuous regions. Thicker layers of dust do not allow blue light to escape. Throughout the cloud, you can see cavities that were produced by material that was ejected from the protostar colliding with material in the cloud.
<urn:uuid:898191f5-c616-46ae-965a-78dc42a4e6b4>
CC-MAIN-2023-50
https://www.labroots.com/trending/space/24076/jwst-images-star-midst-formation
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.948697
559
3.71875
4
The subject's action or state. An object is a person or thing that is influenced by a verb's action. The word 'object' is usually used to refer to the thing or person to whom the action is directed. Alternatively, the one who is the recipient of the action. In a sentence, a direct object is a noun or pronoun that receives the action of a verb. A verb is a word or a group of words that describes an action, a state of being, or a situation. The component of a phrase that tells us what the subject does is called a verb. The heart of an English phrase is a verb. In a sentence, a verb is the action or state of being. Depending on when the action is performed, verbs can be stated in different tenses. Some instances are as follows: Jennifer, for example, walked to the store. Typically, noun phrases are used as objects (a noun or pronoun and any dependent words before or after it). In a clause, objects usually come after the verb: Everyone likes her. She is well-versed in every subject. Padhane wali medam ho to aisi 😄 Please help me This course is very useful,♥️👍 English Spoken Course Its a Excellent,good and mem communicationis a good so I am learning ,lessening and reading so very fast... (Thankyou so much Dear madam) She is the sweetest.. thank you mam A good and knowledgeable westie for a poor students . Love Indian teachers. Such a useful and helpful website for a poor students. Thanks a lot sir g Nilesh kumar rajwade Every teacher taught phenomenal and helpful for seeking to learn English and improve themselves.
<urn:uuid:0df3839a-340b-4efd-9d34-1c11639b40d9>
CC-MAIN-2023-50
https://www.learnvern.com/english-grammar-course/verbs-and-objects-in-grammar
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.919756
363
4.09375
4
Recently, Both Meghalaya and Assam said they would seek a probe from a central agency into the Assam Police firing that killed six people along the states’ border. GS II- Polity and Governance (Federalism) Dimensions of the Article: - About Assam-Meghalaya boundary Dispute - Will the partial settlement impact border disputes elsewhere in the Northeast? About Assam-Meghalaya boundary Dispute: - Assam and Meghalaya have a longstanding dispute in 12 stretches of their 884-km shared border. - Meghalaya, carved out of Assam as an autonomous State in 1970, became a full-fledged State in 1972. - The creation of the new State was based on the Assam Reorganisation (Meghalaya) Act of 1969, which the Meghalaya government refused to accept. - This was because the Act followed the recommendations of a 1951 committee to define the boundary of Meghalaya. - On that panel’s recommendations, areas of the present-day East Jaintia Hills, Ri-Bhoi and West Khasi Hills districts of Meghalaya were transferred to the Karbi Anglong, Kamrup (metro) and Kamrup districts of Assam. - Meghalaya contested these transfers after statehood, claiming that they belonged to its tribal chieftains. Assam said the Meghalaya government could neither provide documents nor archival materials to prove its claim over these areas. - After claims and counter-claims, the dispute was narrowed down to 12 sectors on the basis of an official claim by Meghalaya in 2011. Will the partial settlement impact border disputes elsewhere in the Northeast? - According to the partial boundary deal, Assam will get 18.51 sq. km of the 36.79 sq. km disputed area while Meghalaya will get the remaining 18.28 sq. km. - There is no clarity yet on the villages or uninhabited stretches that would be divided, but some political parties and community-based groups in Meghalaya are unhappy about acceding any part of the disputed areas to Assam. - Reactions are similar in Assam, where the opposition Congress and local organisations said the agreement boiled down to how much land Assam could save from “aggressor” Meghalaya. - But officials in Assam said it was better to let go of areas where they did not have any administrative control rather than “live with an irritant forever”. - However, residents in the other six disputed sectors — Langpih, Borduar, Nongwah, Matamur, Deshdemoreah Block I and Block II, and Khanduli — feel the “give-and-take” template could spell disaster for them. - The fear is more among non-tribal people who could end up living in a “tribal Meghalaya with no rights for us”. - The apprehension is similar for residents of Assam in disputed areas along the border with other States. According to a paper tabled in the Assam Assembly in August 2014, six neighbouring States control 77,531.71 hectares of Assam land. - Apart from Meghalaya, the other States are Arunachal Pradesh, Mizoram, Nagaland, Tripura and West Bengal. -Source: Indian Express
<urn:uuid:35a89dbd-864a-4147-b10e-13134ee6c174>
CC-MAIN-2023-50
https://www.legacyias.com/the-assam-meghalaya-boundary-dispute-resolution/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.92813
733
2.890625
3
The mesmerizing honeycomb patterns found in salt deserts such as Badwater Basin in California's Death Valley and Salar de Uyuni in Bolivia have perplexed tourists and inspired sci-fi movie-makers for decades. Scientists, too, have struggled to elucidate the mechanism behind the iconic shapes. Now, physicists think they've finally solved this natural puzzle. "The fantastic landscape demands an explanation," Lucas Goehring, an associate professor of physics at Nottingham Trent University in England, said in a statement. "What we've shown is that a simple, plausible explanation is there, but hidden beneath the ground." The answer lies in the groundwater beneath the salt crust, according to a study published Feb. 24 in the journal Physical Review X. In the study, researchers describe how layers of salty and less salty water circulate up and down in donut-shaped currents, which are squeezed together horizontally to form the regular pattern. Previously, scientists suggested that the cracks and ridges form as the salt crust expands and dries out, bending and fragmenting under the strain. Now, the researchers note that previous attempts to understand the iconic landscape didn't account for the uniform size of the hexagons, which are always 3 to 6 feet (1 to 2 meters) across, wherever in the world they are found. The new study confirms the widely accepted idea that the geometric patterns are formed by a mechanism rooted in basic thermodynamics, similar to the movement of hot and cold water in a radiator or in a pot of boiling water. "The surface patterns reflect the slow overturning of salty water within the soil, a phenomenon somewhat like the convection cells that form in a thin layer of simmering water," Goehring said. Salt deserts aren't as bone-dry as they seem. Beneath the salt crust sits a layer of extremely salty water, which can be reached by digging with your hands. The water evaporates in the hot summer months, leaving only a blanket of salt, some of which dissolves into the next layer of water. This layer is then more dense than the one below it, and the salty water sinks in a ring that surrounds fresher, less dense water rising to replace it. The water evaporates and leaves a salt residue, which dissolves into the top water layer again. The cycle repeats itself to form what scientists call a convection roll. Research on salt deserts has focused either on these subsurface currents or on the crust. The new study argues that the two features interact and mirror each other to form the tessellations. Where the dense, salty surface water sinks, salt accumulates on the crust to form ridges. The salt crust grows more rapidly around the edges of each hexagon because it is in contact with saltier water than the middle. Normally, a convection roll would adopt a circular donut shape. Because there are so many of them packed closely together on a salt flat, however, the rolls are squeezed against each other to form hexagons, the researchers said. The authors present a convincing explanation for the striking pattern, Stuart King, a researcher at the University of Edinburgh in Scotland who did not participate in the study, told Live Science in an email. "It is well known that hexagonal patterns arise from convection and evaporation processes, [but] this paper connects that with the penetrative convection of the porous layer underneath, which seems very plausible as a wider mechanism driving the whole salt formation." The scientists say their work was driven purely by curiosity. "Nature presents us with an obvious and fascinating puzzle that stimulates our curiosity and thereby prompts us to solve it — even without any direct further possibility of application in mind," study first author Jana Lasser, a postdoctoral researcher at Graz University of Technology in Austria, said in the statement. Live Science newsletter Stay up to date on the latest science news by signing up for our Essentials newsletter. Sascha is a U.K.-based trainee staff writer at Live Science. She holds a bachelor’s degree in biology from the University of Southampton in England and a master’s degree in science communication from Imperial College London. Her work has appeared in The Guardian and the health website Zoe. Besides writing, she enjoys playing tennis, bread-making and browsing second-hand shops for hidden gems. "Giant Dessication Polygons of Great Basin Playas" was a paper in the 70's. The polygons are not always small, and they are not all hexagons. A pentagon is in the center of the photograph. There are several forms of patterned ground, including permafrost.Reply mmmmm, donutsadmin said:Physicists have finally uncovered the mechanism behind the spectacular patchwork of hexagons on salt flats. The answer lies hidden beneath the crust and works like a donut-shaped radiator. Scientists solve mystery behind strange honeycomb pattern in salt deserts : Read more
<urn:uuid:074c7284-3757-44db-a22e-7844c1a3ead1>
CC-MAIN-2023-50
https://www.livescience.com/scientists-solve-mystery-behind-strange-honeycomb-pattern-in-salt-deserts
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.944836
1,014
3.765625
4
A Brief History of the Lakar Family Literary Genres › History | Tibetan Masters › Mayum Tsering Wangmo Courtesy of Terton Sogyal Trust A Brief History of the Lakar Family by Mayum Tsering Wangmo This is a history of the family of religious benefactors, the Aduk Lakar Tsang from Trehor, a region that is also called Hor Ser Dara Khag Nga, located in the part of Eastern Tibet known as ‘The Four Rivers and Six Peaks’. The story of this great family, whose fame extended throughout all three provinces of Tibet, is based on recorded interviews with Ma-yum Pema Tsering Wangmo. The Family’s Origins Legend has it that the family descends from a magical emanation of Nyenchen Tanglha, the protector deity of Tibet, but the first recorded events tell how the family received the name of ‘Lakar’. The founder of the Gelugpa or ‘Yellow Hat’ order of Tibetan Buddhism was Je Rinpoche Lobzang Drakpa (1357–1419), who was the bodhisattva of wisdom in human form. When he first made his way from Amdo in the far north east to the central region of Tibet, he journeyed through Trehor, and was received by a man in white who offered him a white (kar) woollen shawl (la) to protect him from the cold and rain. As he received this immaculate white shawl, Je Rinpoche saw it as an auspicious sign for the future. Full of joy, he exclaimed, “From now on, for generations to come, your family will know unrivalled prosperity and good fortune. You shall even take ‘Lakar’ as your family name.” It did indeed come to pass that the Lakar family’s fortune and prosperity grew far greater, but not only that, they used their wealth to become unbiased patrons of all the major orders within Tibetan Buddhism. They sponsored Je Tsongkhapa himself when he went on his debating rounds, and it is well known that they supported the great annual prayer festival in Lhasa, the Mönlam Chenmo, which Je Tsongkhapa first established in 1408. In fact, each time this festival was held, every year up until the Communist Chinese first entered East Tibet in the 1950s, the Lakar family donated gifts of tsampa, tea and butter to all who participated. Mayum-la remembers that they had a tradition of giving each and every monk a silver coin (tam) and a measure of tea. There are different explanations as to why the Lakar family’s region was called Hor Ser Dara Khag Nga, or the Five Territories of the Hor Ser Chiefs. According to one explanation, this originated when Chögyal Pakpa (1235–1280) had been invited to China by the Mongol emperor Kublai Khan. On his way back, he was accompanied by the son of King Hor Ser Chen and predicted that the king would have a son born in that region, whose descendants would settle there. Another tradition explains how it dates back to the Lakar family’s patronage of the Mönlam Chenmo festival in Lhasa. One day, the sponsors were invited to an audience before the assembly and made to stand beside an enormous table, upon which different kinds of food had been arranged in huge quantities. The representative of the Lakar family lost his balance while prostrating; and, as he stumbled, knocked over the table stacked with food, causing a great shower of grains and other foodstuff to fall onto the assembly of monks, all of whom fell about in uncontrollable laughter. When Je Rinpoche saw this he thought it was a wonderful sign, and foretold how the beneficience of the Lakar family would bring joy to the monasteries of Tibet for many generations to come. Indeed, from that time onwards the Lakar family grew increasingly prosperous and became patrons of all the major monasteries in Tibet. For the Nyingma school, this meant the monasteries of Dorje Drak and Mindroling in the upper regions, Shechen and Dzogchen in the middle regions, and Kathok and Palyul in the lower regions; but especially, the monastery of Dzogchen and all its throneholders, beginning with the great Dzogchen Pema Rigdzin (1625–1697). For the Sakyas, this meant all the monasteries, headed by the three seats of Sakya, Ngor and Tsar, and all their lamas and incarnations. For the Kagyü, this meant the monasteries, lamas and tulkus of the Karma, Drukpa, Drikung, Taklung and other traditions, headed by the Gyalwa Karmapa and Palpung Situ. And also for the Gelugpa, it meant all the major lineage holders, beginning with the three main seats of Sera, Ganden and Drepung. In short, it is said that there was not a single monastery, great or small, in the Land of Snows that did not receive the family’s help. For example, in a small Kagyü monastery called Dzari Gulgön, there was a droma root called the ‘Lakar droma’, which remained there continuously. There are no surviving accounts from the lives of Mayum-la’s ancestors of these early generations, and noone today can remember even their names, but there are accounts of the family dating from as recently as three or four generations ago. The family at this time was headed by Lakar Jamyang (who was said to be an emanation of Dzambhala, the god of wealth) and his brother Kalu. They were both married to a girl called Gyatso Drönma, who was considered to be the daughter of a protective deity called Dongchen Nyanya, and had a spontaneously arisen mark on her right arm in the shape of a fish. Ya-ho and Tsok-ho Their two sons, Ya-ho and Tsok-ho, were to become known as emanations of the Buddha’s famous patron Anāthapiṇḍika. It was during this period that the family became famed for never saying no, and its charity reached an unimaginable scale. This was also the era of the famous masters Jamyang Khyentse Wangpo (1820–1892), Jamgön Kongtrul (1813–1899), Chokgyur Dechen Lingpa (1829–1870), Dza Patrul Rinpoche (1808–1887) and Mipham Rinpoche (1846–1912). The Lakar family helped these and other masters, and supported their monasteries whilst at the same time giving alms to the poor and needy. They were able to give whatever was needed, as if they were granters of wishes. There are stories from this time describing how the family was involved in trade between China and Tibet, and how they transported many train-loads of gold, silver and other goods to and from the stations. Ya-ho and Tsok-ho both married a daughter of the Aduk family called Tsering Lhamo, who possessed the marks of a ḍākinī, and was the aunt of the sixteenth Gyalwang Karmapa, Rigpe Dorje (1924–1981). Following the advice of His Holiness the Dalai Lama and those who warned that an era was coming to an end, the Lakar brothers divided their wealth and gave half away to religious projects. Whereupon, as a sign of the infallibilty of karma, their wealth grew even greater! People even began to say that the Lakar family’s gold and silver must be breeding! The family conceived a plan to offer to every Nyingma monastery a set of three statues portraying Khenpo Śāntarakṣita, Guru Padmasambhava and King Tri Songdeutsen, to every Kagyü monastery three statues of Marpa, Milarepa and Gampopa, to every Sakya monastery a set of statues depicting their own five patriarchs, and to every Gelugpa monastery three statues portraying Je Rinpoche and his two main disciples. In Dzogchen monastery, the statues of the Khenpo, Guru and King were made from gold and copper. The main figure rivalled in size the great Maitreya Buddha statue in Tashilhunpo. The Guru’s statue had five different necklaces, and the King’s had three. Later, when Dzogchen monastery burned down in a fire, the flames could not reach the Guru’s necklace because it was too high up, and the King’s necklace too was rescued. They were both used towards the cost of rebuilding. These were not the only statues they funded; there were also images of the eight great bodhisattvas, the hundred peaceful and wrathful deities, a thousand Guru Rinpoches, a thousand Buddhas and the three long-life deities. The family also made vast donations towards images made from gold and silver and other precious substances. And that was just at Dzogchen monastery! They also helped construct statues at many other monasteries. To put it simply, whenever a monastery or a lama needed support or contributions towards a project, they would always turn to the Lakar family. And the family also helped the rest of the population by giving food, clothes and medicine, and assisting those in danger. On one occasion, for example, a Chinese official was passing through a town called Arab Nang in the Dza region on his way to Lhasa, when he was attacked by bandits and left to die. Some time later the Chinese captured all the people of the town and sentenced them all to death, but the Lakar family was able to save hundreds of lives by offering to pay five thousand weights (srang) of gold in compensation. On another occasion, when a severe famine struck the area of Do-me, the Lakar family provided food and grain to all who were affected. There was a saying at the time, well known even outside Tibet, which went: “The rich Chinese are richer than rich, but the poor Chinese are poorer than poor,” and this was especially true of the Chinese porters who used to carry tea up to the Tibetan border at Dartsedo. They were exceptionally poor and, because of the heat in China, some of them would arrive wearing nothing more than a pair of short trousers. Many died from exposure. In order to help them, the family had sacks made from woollen cloth and sent them regularly to the border, filled with supplies of warm clothing and food. In every generation the Lakar family served the Tibetan government of Ganden Podrang. Every year they would bring supplies from China, and they would make a special point of buying ‘sugar horse teeth’, which were a particular favourite of the Thirteenth Dalai Lama. During the reign of this Dalai Lama, the Lakar family fulfilled his wishes by increasing its sponsorship of stupas at the Border Taming temples (ta dul) and Further Taming temples (yang dul), dedicated towards continued stability in the religious and secular life of Tibet. The family also made regular contributions towards the cost of food for the monks of Namgyal Monastery. In recognition of their services, and in order that they might bring even greater benefit to people, the Thirteenth Dalai Lama Thubten Gyatso issued a special decree granting the Lakar family permission to use all the salt mines in Tibet. It is undeniable that the Lakar family enjoyed exceptional wealth for many generations and employed many merchants and traders; even so, they themselves were genuine Dharma practitioners who did not engage much in business dealing. Ya-ho and Tsok-ho, for example, were both disciples of Dza Patrul Rinpoche and Ju Mipham Rinpoche. Although the Lakar family had always been chieftains in Hortö, Dza Patrul and Ju Mipham both advised the brothers that in the current age they would do better to surrender their office. On this advice, they made repeated offers of resignation, but when these offers were refused, they were forced to continue in their posts for several years. All the while, they persistently pleaded for resignation, until finally, when they explained that their level of support would not diminish and it was only the title of chieftain they wished to pass on to Tseho, the elder brother of Ashe Tsering Lhamo, their request was accepted. Patrul Rinpoche was once circumambulating the maṇi wall at Dza Mamo Khamdo, when he came across a mule belonging to the Lakar family. It was carrying a load of silver on its back, but had fallen asleep on a rock shaped like the Tibetan letter ‘la’, and did not want to move. Patrul Rinpoche saw this as a sign, and said, “We must build a big maṇi wall here and you must sponsor it.” Straightaway, he was offered the very silver on the back of the muel, and the Lakar family became the sponsors of what later became the famous wall of ‘Palge Maṇi’. The great Mipham Rinpoche praised the Lakars many times. For example, he quoted a line of verse in reference to them: “Although remaining householders, with faith in the genuine teachings.” Tutob Namgyal and Sonam Tobgyal The two sons of the next generation were Lakar Tutob Namgyal, who was an incarnation of Tertön Nyima Drakpa (1647–1710) and just like another Anāthapiṇḍika, and Sonam Tobgyal, who was an emanation of Gönpo Tsokdak (Skt. Gaṇapati). The elder brother, Tutob Namgyal, put such effort into studying the scriptures from an early age that he grew to be as learned as a senior khenpo, and was also an exceptionally skilled medical doctor. Sonam Tobgyal, the younger brother, was said by many masters to be an emanation of the protective deity Gönpo Tsokdak. Although he was recognized as this protector from the brown Sergyi Drongri Mountain in Golok, he was never to take up his seat. The fifth Dzogchen Rinpoche Tubten Chökyi Dorje, said that, except for a short time spent there in retreat, it would be better if he did not stay too long. He did undertake a retreat, and he visited the shrine there, which none but his previous incarnations had been able to enter. Inside, he noticed that the protector’s coat and staff had disappeared. He invoked the deity for several days, until the missing items returned, producing confidence in all who were present. Whilst on his way to Lhasa on a pilgrimage, local deities would come to meet him, and his servants saw him carrying on conversations with them. When he arrived in Lhasa, the government gave him a formal welcome, and as he circumambulated the Jokhang his magnetism and spectacular presence were so powerful that everyone, great and small, could not help but rise to their feet as he passed. Tragically, due to some unfortunate circumstance, he fell whilst making offerings at Samye Monastery and died when his body struck the famous self-arisen stone stūpa. Some people took this to be a sign that he was an emanation of King Trisong Deutsen. Mayum-la heard that when his body was carried back to Lhasa, the wives of the aristocracy and other noble women went on top of their roofs to perform the rites for summoning prosperity (yang guk) using arrows of invocation (dadar). Tutob Namgyal and Sonam Tobgyal had two sisters. The younger one was a nun, and the elder, Pema Lhamo, was the consort of Yakzer Tertön, who was sometimes called Lakar Tertön, and was just like a second Guru Rinpoche. On one occasion, the diseases known as takten and nyagé were ravaging lower Tibet and causing many deaths. Lakar Tertön said, “We must prepare to go to the lake on top of the mountain peak tomorrow. Bring a flask of alcohol!” When they approached the lake the following day, he said, “Now you all stay here and recite the vajra guru mantra. Do not follow me!” and he went on alone. But Könchok Samdrup, Jordo and Tutob Namgyal followed him in secret and watched as the tertön went into the middle of the lake, surrounded by rainbow light. Suddenly, the water in the lake began to boil and he disappeared. After a short while, he reappeared surrounded once again by rainbow light and cradling a treasure casket in his robes. “This is a little tarnished,” he said, “But that is just the breath of the nāgas.” So saying, he rinsed it in alcohol and made it clearer. This was how he revealed a treasure of extraordinary medicine and images of the Lords of the Three Families: Avalokiteśvara, Mañjuśrī and Vajrapāṇi. The medicine was sent to the affected area, where it wiped out the disease and saved many thousands of lives. Whenever any member of the Lakar family gave away medicine, they would always donate it free of charge, and refused to accept even so much as a silk scarf in return. The two brothers Tutob Namgyal and Sonam Tobgyal were married to Dechen Tso, the daughter of the king of Ling, Wangchen Tendzin, who was himself a direct descendent of Bumpe Gyatsa Shyalkar, the elder brother of the leonine warrior Gesar, the legendary manifestation of Guru Padmasambhava and patron deity of the Tibetan people. Khandro Tsering Chödrön and Pema Tsering Wangmo Dechen Tso had one son and two daughters, but the son did not live long. The younger daughter was an actual emanation of Jetsün Tārā, named Khandro Tsering Chödrön (1929–2011). When she was sixteen years old, she went to make offerings at a temple where the peerless master Jamyang Khyentse Chökyi Lodrö, whose kindness surpassed even the Buddha’s, was residing in poor health. Although the volumes of the Word of the Buddha (kangyur) had been recited a hundred times, it had not brought any improvement in his condition, and many masters were requesting that he take a consort, but he would not listen. They were offering him a statue of Jetsün Tārā as a symbolic consort, when, just as they were checking for auspicious signs, Khandro Tsering Chödrön lost her way and inadvertently joined the ceremony. Everyone there took this to be a clear sign that she was destined to become his consort. Soon afterwards, his health improved and for many years he was able to work for the benefit of the teachings and beings, but so glorious and renowned were the celebrated achievements of his life that we do not need to retell them here. The elder sister, Pema Tsering Wangmo, was born (in 1925) with all the compassion of the ḍākinīs, and pure faith and devotion beyond compare. She is the mother of Sogyal Rinpoche, who is now considered by many to be as precious as their very own eyesight, and whose fame has spread across the earth like the light of the sun and moon. Many masters prophesied that Sogyal Rinpoche would be born as the authentic incarnation of Tertön Lerab Lingpa. At his birth, there were many wonderful signs, such as rainbows arching over the roof of the house, and on that auspicious day there was not the slightest problem of any kind. Only six months later, the young child was invited to see Jamyang Khyentse Chökyi Lodrö at Dzongsar, the seat of the Khyentses. Whilst on the way, his father Jamga and mother Tsering Wangmo, as well as Ani Pema Lhamo, the male servant Tsering Pepe, the female servant Ape Lhadzom and many others heard him utter his very first words as he recited the vajra guru mantra aloud three times. Khyentse Rinpoche invited the party to join him for a special meal on an auspicious date, and when they went in to see him, everything had been prepared for an enthronement ceremony. As soon as Ani-la saw what was intended, she was amazed and said aloud, “What are you doing? He is the family’s only son. He can not be given away to anyone.” In response, Khyentse Rinpoche wrote a statement in his own hand, in which he clearly identified the boy as a genuine incarnation of Tertön Sogyal. On another occasion, when the family were in Hor, the young Sogyal tulku took three phurbas from under the carpet while he played in his room. His mother and father tried many times to discover whose they were, but noone claimed them, and they became objects of worship. Once, when he was playing in the Guru Rinpoche temple, he was heard shouting, “Come quickly! Guru Rinpoche is standing up!” But before anyone could get there, the Guru Rinpoche statue had sat back down again. The first to arrive later remarked how he had seen Guru Rinpoche’s khaṭvāṅga trident still rattling. Sogyal Tulku’s games were not like those of other children. For toys, he would use the ritual instruments from the monastery, and everyone observed how he was always well-mannered and polite. Rinpoche and the other members of the Lakar family travelled together with Jamyang Khyentse and a retinue of about fifty-five people to India. As he was passing away in Sikkim, Khyentse Rinpoche gave instructions that Khenpo Appey should take charge of Sogyal Tulku’s education. When studying with Khenpo Appey, the young Sogyal was always at the head of his class, and came first or second in examinations taken with many other lamas and tulkus. Later, when he attended school, he outperformed the other children to such a degree that he used to complete two years’ classes in a single year! Not only that, as he felt compassion and concern for his parents, he chose not to sleep at the school, and when his teachers asked him why he could not stay on the school premises, he replied that his parents were having difficulties, because they had no fewer than fifty-five old lamas in their care. At one point, the children were told that an important foreign guest would be visiting their school in a few days, and that to mark the occasion they each had to write a special essay. Rinpoche wrote something, which was read by the guest, who immediately asked after its author. “He is a boy in class five,” he was told. The guest was amazed: “Impossible! A child in class five could never write something like this,” he said. “Bring him here!” When Rinpoche arrived, they talked for a while and the guest went away most impressed. He later became Rinpoche’s sponsor. After he finished school, Rinpoche accompanied the Prince of Sikkim to college in Delhi, and afterwards to England, where he studied at Cambridge, and gained an unrivalled knowledge of the religious traditions in the East and West. What followed, in terms of his service to the Buddhist teachings and his work to help beings, is so well-known that we shall not repeat it all here. While Mayum-la was pregnant with her youngest son, Dzogchen Rinpoche, she performed an offering to the goddess Tārā in the presence of Jamyang Khyentse Chökyi Lodrö’s reliquary stūpa (kudung) in the Palace Monastery at Gangtok. During the ritual, a nun went to fetch the offering water, but found to her surprise that, in place of the water, there was only milk. Khandro Tsering Chödrön joked, “There is not even enough milk for the people to drink, so it will be alright if we offer water instead.” But the nun insisted that there was no water, only milk, and Khyentse Rinpoche’s attendant was able to confirm this. At the actual time of his birth, the water once again turned into milk, and there were many other miraculous and auspicious signs. Dodrupchen Rinpoche, His Holiness the Fourteenth Dalai Lama and many other leading masters recognized him as the Seventh Dzogchen Rinpoche, the genuine incarnation of Jikdral Changchub Dorje (1935–1959). The interviews with Ma-yum Pema Tsering Wangmo were transcribed by Tashi Phuntsok. Dzigar Kongtrul Rinpoche and Ringu Tulku Rinpoche kindly read through the manuscript and made corrections. Alak Zenkar Rinpoche later clarified many difficult passages. | Translated by Adam Pearcey, 2005, updated 2018. He would have been sixteen years old at the time. ↩ grwa skor. ↩ ja 'bri dang is a type of tea of the highest or second-highest grade. bag chung is a measure of brick tea, a quarter of a bag chen. ↩ Dara is a Mongolian word meaning chief. It is the equivalent of the Tibetan dpon po. ↩ The hierarch of the Sakya school who was recognized as the ruler of Tibet by Kublai Khan. ↩ Droma (gro ma) is a sweet root that became a popular delicacy in Tibet. It was a particular favourite of the nomads. ↩ Fraternal polyandry was widely practised in Tibet until very recently. ↩ Anāthapiṇḍika, whose name literally means ‘Giver of alms to those without protection’ was a wealthy householder and patron of the Buddha. He is most famous for having given the Buddha and his monks the famous Jetavana grove in Śrāvastī, where the first buddhist vihāra or monastery was built. ↩ This fire happened in 1936, the year after the fifth Dzogchen Rinpoche passed away. ↩ maṇi rdo 'bum. A wall of stones carved with mantras such as Oṃ maṇi padme hūṃ. ↩ This line is from a dharmapālas offering text known as Entrusting Activity to the Samaya-bound Dharma Protectors ('phrin bcol) by Jigme Lingpa. The Lakar family sponsored the carving of woodblocks for the printing of several volumes of Mipham Rinpoche’s collected writings. ↩ Possibly because this was the site of the king’s own death. ↩ lhag 'then is a kind of stroke. nya gas causes the skin on the calves to dry up and crack. ↩ This was the famous Lingtsang Gyalgenma, ‘The Old King of Ling’ (gling tshang rgyal rgan ma), a tertön famous for his terma related to Tsendali (Skt. Caṇḍālī), the consort of Amitāyus, the Buddha of Boundless Life. Sogyal Rinpoche, besides being identified as an incarnation of Tertön Sogyal and Do Khyentse, was also recognized as an incarnation of Lingtsang Gyalgenma, his own great grandfather. ↩
<urn:uuid:a400b4b0-6847-4710-966d-cbe199506f47>
CC-MAIN-2023-50
https://www.lotsawahouse.org/tibetan-masters/mayum-tsering-wangmo/lakar-history
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.980535
6,064
2.984375
3
The red strep rash of scarlet fever is the hallmark sign of the disease. Scarlet fever occurs in a small percentage of children, most commonly between the ages of 5 and 12, who get a strep throat infection (streptococcal pharyngitis), and less often, a strep skin infection. Because scarlet fever is usually associated with a strep throat, this scarlet strep rash is typically accompanied by the symptoms and signs of strep throat. The distinctive strep rash of scarlet fever is caused by a toxin produced by the strep bacteria that affects the skin. Some people refer to the condition as strep rash, while others call it scarlet fever rash. The rash can be identified by the following features: - Looks like multiple fine, red, slightly raised bumps - Feels rough like sandpaper - Looks like sunburn - Looks brighter red in skin creases, such as the neck, elbow, knees, armpits and groin (Pastia's lines) - The redness turns white when pressed - The face is red with often a pale ring around the mouth. The strep rash usually: - Starts 1-2 days after a fever occurs, but can begin up to a week later - First appears over the neck, chest and abdomen, and then spreads all over the body - Resolves in 7 days After the strep rash resolves, the skin can peel, especially on the tips of fingers and toes, the palms, and the groin. Scarlet fever and strep throat are caused by a bacteria called group A beta-hemolytic streptococcus (Group A beta strep). Scarlet fever can occur 1 to 7 days after exposure to the bacteria, with an average of 3 days. Group A beta strep: - Is common in the throat, nose, and skin - Can cause other skin diseases such as impetigo - Is highly contagious during an infection - Can be spread from infected airborne droplets from the mouth or nose through coughing or sneezing. - Can also be spread from touching infected sores and then the nose or mouth - Less commonly, it can also be spread from sharing utensils or towels Symptoms of Scarlet Fever In addition to the scarlet rash, the symptoms of scarlet fever are those commonly seen with strep throat alone: - Severe sore throat - A swollen throat - A swollen tongue - Difficulty swallowing - High fever Secondary symptoms include: - Body aches If sore throat is accompanied by coughing, sneezing, or a runny, stuffy nose usually the cause is a virus and not group A beta-strep. When a child is taken to the doctor with a red rash accompanied by fever and a sore throat, an examination will be required to determine if he or she may have strep throat or scarlet fever. The following signs can help to make the diagnosis: - Temperature of greater than 101°F (38.3°C) - Red, swollen throat - Swollen tonsils - White or yellow spots in the throat or on the tonsils - A swollen tongue with red bumps; the so-called 'strawberry tongue' - Swollen or tender lymph glands in the neck To confirm the diagnosis of strep throat or scarlet fever a doctor can do one or two lab tests: - A rapid test from a throat swab, which can be done in 10 to 15 minutes in the office - A throat swab culture, which must be sent to a lab and will be ready in 1 to 2 days The doctor usually starts with the rapid test and if it is positive he can prescribe treatment then. If the rapid test is negative, a throat culture is sent to the lab to be sure. The doctor can decide whether or not to begin antibiotic treatment before the lab results come back based on: - The severity of the symptoms - His or her degree of certainty that the child has a diagnosis of strep throat or scarlet fever Treatment of Strep Throat and Scarlet Fever Scarlet fever and Strep throat are curable with oral antibiotics, usually a penicillin such as Amoxicillin. Antibiotics shorten the time a child is contagious and most patients will not be contagious after 24 hours of antibiotics. Other treatments for relief of symptoms include: - Soothing throat lozenges - Cool baths - Humidifier or vaporizer to help throat symptoms and breathing - Ibuprofen (Motrin, Advil) or Acetaminophen (Tylenol) to relieve body aches and fever Anyone less than 20 years old should not be given aspirin because of the risk of Reyes' syndrome, a potentially fatal liver and brain disease. Complications of Strep Infection If strep throat or scarlet fever is left untreated the following can occur: - Abscess formation in the tonsils or around the tonsils (peritonsillar) - Middle ear infection Less common but serious complications include: - Rheumatic fever, an autoimmune process primarily affecting the heart and joints and can lead to rheumatic heart disease from damaged heart valves and arthritis - Glomerulonephritis, an autoimmune inflammation of the kidneys that can lead to kidney failure - Pediatric autoimmune neuropsychiatric disorders associated with streptococcal infections (PANDAS), a rare condition where symptoms of certain problems the child has, such as OCD and Tourette syndrome, can worsen - Avoid contact with others who are infected - Wash hands - Avoid sharing personal items, such as towels and utensils Curable With Treatment Scarlet fever with its accompanying distinctive scarlet strep rash is highly curable with early treatment. If your child develops a rash with sore throat and a high fever, be certain to see a doctor for treatment with antibiotics to prevent serious complications.
<urn:uuid:c28eb6c9-c02f-44cd-b2ff-5e8d40ab96c7>
CC-MAIN-2023-50
https://www.lovetoknowhealth.com/skin-and-body/scarlet-fever-rash
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.912764
1,240
3.359375
3
Our interactive K-Film, ‘Eyes – The Window to the Soul,’ is an exploration of the human eye. It explores how certain things can go unnoticed by the human eye, such as the clip with the bee in the spider web. It explores the nature of eyes in certain contexts, such as doing one’s makeup. It explores the inclination of eyes to lock themselves onto interesting things to in mundane settings, such as that of the men playing chess at the library. It explores how eyes are lured by technology, such as mobile phones. It explores how eyes can identify the emotions and personality of humans and of animals. It explores how the eye is attracted to movement, of transportation or of the surrounding environment. It explores how eyes can make us patient, through long shots of the sky or sunsets. It explores how the eye recognizes the relationship between light and darkness, with the clip showing the strobe light. The aim of our Korsakow film is to force the audience to think outside the box, and consume the film in a personal way that only the individual can interpret and understand. “A narration’s structural patterns, rhythms and pacings can evoke feelings of boredom, arousal, calm, anxiety; encourage identification with the story world and investment in outcomes,”(Luers, 2013). Our film is a congregation of elements associated with the eye, from endless differing internal and external perspectives. At times, the film explores events and occurrences that can go unnoticed by the human eye. Events that the average human doesn’t spend time concentrating on. This film allows the audience to see a side of life they usually choose to neglect. Patterns are very significant throughout our film. The immense detail in the eye itself, contrasts significantly with pattern and shapes associated with objects the eye sees. This relates back to our overall subject. There is an enormous amount of detail in our footage of purely the eye, compared to our shots of objects the eyes sees, ultimately relating back to how important the eye is. Our editing patterns are also extremely effective in how we want the viewer to feel whilst watching our K-film. We have deliberately included short, sharp and fast clips alongside slow, motionless and somewhat lifeless clips, again breaking any rhythm to allow for mixed interpretation. Another theme is the abstractness of the subject. In some scenes, we want the audience to look straight at the middle of the shot such as that of the eye themselves, whereas in others we wish to direct the viewer’s attention with the movements, such as that of the clip of the light bulb from its shadow. The significance of eye colour, and the difference in eye colour, is also important for our film. Each eye and eye colour tells a different story. Each eye has seen something different the next. Each has a story of its own, so therefore separating these by colour works really well for our film. We have also chosen to use a mixture of the same actors in our film, to build repetition and familiarity within it. As we have mentioned, we want out Korsokow film to be viewed a number of times, and for a different experience to be reaped each time, so therefore we need the audience to build a rapport and sense of trust and familiarity with our actors, hence why we haven’t included individual separate actors for each clip. The exploration of our theme of all things the human eyes speaks well through our content in our K-film. “Many new media objects do not tell stories; they don’t have a beginning or end; in fact, they don’t have any development, thematically, formally, or otherwise, that would organize their elements into sequence. Instead they are a collection of individual items, where every item has the same significance as any other.” (Manovich, 2002 via Luers, 2013). Our exploration is achieved through an array of footage, some close up, some macro lense work and some long panning shots. The camera movements vary, from up to down, down to up, side to side, forward and back. We really enjoy the films use of close ups, specifically the close ups on the human eye of different individuals. We wanted to move away from showing just 60 clips of the human eye, as we felt it may get boring for the viewer. Instead we opted for an abstract exploration of not only the eye as a form itself, but also things that we see, and how these things can tell you so much about a person or a setting. The patterns of internal and external viewing of the eye interlace narrative through the piece, which is also achieved with a simple interface layout that works at not distracting the viewer with outside interruptions. “Narration is offered through the interface – the design and layout and linking specifically,” (Soar, 2014). Our Interface layout is one larger tile with three smaller tiles aligned together along the bottom. “However the interface is designed, the entry point prepares the user for interaction and most importantly the desire for interaction. They choose when and where to exit,” (Luers, 2013). This is a great statement form Luers, and one we used to guide us in SNU-fying our clips in order for the viewer not go bored too quickly making them want to navigate away from our film. By “Adding metadata to each short film including key-words, probability, lives, etc and then refining this assemblage based on repeated viewing and test screenings,” (Soar, 2014) we were able to create a connection between clips that may seem completely unrelated to the viewer. Also on the interface, our text thread sits above the main tile of the K-film. Our background image of the sci-fi like macro view of the eye ties our overall theme together. We wanted the overall tone of the piece to be slightly somber, but not too dark or depressive. That is why we took the path we did with the text thread. The text thread was designed to continue with the theme of personal interpretation through the eye. These well thought out text threads were designed to be quiet poetic and abstract, while easily providing a platform for the viewer to interpret and connect personal experience, respectively. The text thread at times can portray a sense of depth to each clip, even clips that seem completely mundane. Each thread guides the viewer down a different path, again making the experience unique and different for each individual, and, for each time the respective viewer watches our Korsokow film, they will take a different journey dependent on their mood, previous experience and overall satisfaction with the film. The video clips, text thread and music work harmoniously together and help develop the pattern of our film. The ambient music works at creating a soft mood, which takes the edge off the text thread. The music continues to play whilst there is no clip selected, and there is no looping that is obvious to the ear, which is a positive. The sounds of soft crushing waves, seagulls and children playing help keep working to evoke emotion. We played around with turning the sound off on our individual clips, but we liked the atmospheric sounds of the clips in our K- film as we felt it helped the viewer to have more of a connection to each individual clip. During the editing process we also played around with moving some clips on a vertical angle, as a way to show that not everyone will see things in the same. Although this is a very literal move, we wanted it to be an abstract idea for the viewer to grapple with, wondering if it was done on purpose or not. We took cue from some of Adrian’s comments in the lecture in developing our work. We found it very interesting how he addressed how humans naturally think about change, and how things should naturally change and be different all the time. He used the analogy of AFL and how you don’t watch one season then never watch it again. Letting go of control was hard for some of us as producers, but as Adrian addressed, “you don’t need a multimedia film if you are not going to let the audience have some kind of agency.” That for us was key in understanding how to let part of our control over creative vision go. We also wanted the audience to experience an emotion, which we found much more powerful than showing them. Having a theme was a good constraint for us, however we left the theme still slightly open and uninterrupted for the viewer by offering an explorative k-film rather than a definitive one. “The list as a structuring device in creative screen based documentary is a formal approach that also speaks of the infinite possibilities in combining and making connections across a networked field of elements,” (Frankham, 2013). Through the use of lists we are making the problem of what’s it all about easer to solve. However, we understand as creators that our intent cannot preserve context or meaning for the viewer.K-films don’t require an ending in the literal sense – the rules of engagement are now very different. It is very interesting to see how far we have come in this course especially surrounding the idea of “endings”. Most of us agreed at the beginning of this subject K-films were slightly confusing because of the lack of ending, but this subject has taught us as humans that not everything has to have a finish or be as we expect, which in-turn helped us in creating our final K-film. We now find K-Films to be a great and interesting medium for film, one that we would like to try our hand at again. Frankham, Bettina Louise. “Complexity, Flux and Webs of Connection.” A Poetic Approach to Documentary : Discomfort of Form, Rhetorical Strategies and Aesthetic Experience. (2013): PhD Dissertation, University of Technology Sydney. Luers, Will. “Plotting the Database.” Database | Narrative | Archive: Seven Interactive Essays on Digital Nonlinear Storytelling. Ed. Matt Soar and Monika Gagnon. N. p., 2013. Web. Soar, Matt. “Making (with) the Korsakow System: Database Documentaries as Articulation and Assemblage.” New Documentary Ecologies Emerging Platforms, Practices and Discourses. Ed. Kate Nash, Craig Hight, and Catherine Summerhayes. Palgrave Macmillan, 2014. 154–73. Print.
<urn:uuid:a99057db-fb18-4f16-91c0-652849c9eff0>
CC-MAIN-2023-50
https://www.mediafactory.org.au/nga-nguyen/category/integrated-media/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.95388
2,164
2.6875
3
Pediatric Dental Appliances Though many parents think of “teenagers” when presented with the term “dental appliances,” the use of such appliances in young children is very common. Some dental appliances may be recommended for preventative purposes, while others may be recommended for treatment purposes. It can be extremely difficult to encourage young children to wear removable dental appliances regularly, but there is some good news. Pediatric dental appliances can prevent injury to the teeth and may also reduce (or even eliminate) the need for extensive treatment later. What types of pediatric dental appliance are most common? There are many types of pediatric dental appliances – each one fulfilling a different dental function. The major categories of pediatric dental appliance are described below: The American Academy of Pediatric Dentistry (AAPD) and American Dental Association (ADA) recommend that children wear mouth guards when engaging in any potentially injurious activity, including sporting and recreational endeavors. The pediatric dentist can craft a customized mouth guard for the child, or a thermoplastic “boil-and-bite” mouth guard can be purchased at a sporting goods store. Similar mouth guards are used for children who “brux” or grind their teeth at night. Sometimes, primary (baby) teeth are lost prematurely due to trauma or decay. Adjacent teeth tend to shift to fill the space, causing spacing and alignment problems for permanent (adult) teeth. Space maintainers or “spacers” are inserted as placeholders until the permanent teeth are ready to erupt. There are two main types of space maintainer: Fixed space maintainers – Depending on the position of the missing tooth and the condition of the surrounding teeth, the pediatric dentist may adhere a “band and loop,” a “crown and loop,” or a “distal shoe” type of spacer to fill the empty gap. All spacers fulfill the same function; just the nature of the attachment to the adjacent teeth differs. Fixed spacers are usually made of metal and are highly durable. If a highly visible tooth is missing, an acrylic button may be added to reduce the esthetic impact. Removable space maintainers – Removable spacers are rarely used with young children. Working a little like orthodontic retainers, special plastic parts fit into the empty slot to prevent the “drifting” of adjacent teeth. Thumb Sucking Appliances The majority of children naturally outgrow their thumb-sucking habit. However, children who continue to thumb suck after the age of five or six (especially vigorously) risk oral complications. These complications include: narrowed arches, impacted teeth, and misaligned teeth. The “palatal crib” appliance usually stops thumb sucking immediately. The “crib” is crafted and affixed to the teeth by the pediatric dentist, almost like a barely visible set of dental braces. Preventing the thumb from reaching the roof of the mouth reduces gratification – and breaks the habit very quickly. Removable variations of the “crib” are also available, and can be used depending on the age of the child and his or her willingness to cooperate. An overbite, where the upper front teeth protrude over the lower front teeth, can be corrected with an expansion appliance, as can a crossbite. The expansion appliance is used to stretch and widen the arch, providing enough space for the teeth to be realigned in a straight manner. Expansion appliances are custom-made, and can be affixed to the inside or the outside of the teeth. Children born with a cleft palate may be required to wear an expansion appliance to prepare the jaw for oral surgery. If the pediatric dentist suspects that the child’s jaws are not growing in proportion to one another, a bionator device may be recommended. In general, the bionator positions the lower jaw forward, helping the teeth to erupt and align properly. This dental appliance is successful in reducing extensive orthodontic treatments later on, and helps to promote natural-looking alignment. If you have questions or concerns about dental appliances, please contact your pediatric dentist.
<urn:uuid:8d4fb714-b902-4be0-9ec1-2905a845afc4>
CC-MAIN-2023-50
https://www.metrotownortho.com/procedures/orthodontics/pediatric-dental-appliances/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.914446
862
2.859375
3
The average cost of sending remittances has decreased gradually over the years, but still remains too high to meet target 10.c of Sustainable Development Goal 10. According to the World Bank. The global average cost of sending 200 USD in 2020 was 6.5 per cent--more than double the SDG target of 3 per cent. Average remittance costs were the lowest in South Asia (4.9%); Sub-Saharan Africa continued to have the highest average cost (8.2%). Though not without risks, sending remittances through mobile money platforms or digital currencies has been considered among experts as one way to lower the cost of sending money home, as it reduces and even eliminates fees charged by intermediaries such as financial institutions and money transfer operators. According to the World Bank, there was a shift to sending remittances through mobile money platforms during the Covid-19 pandemic.
<urn:uuid:7cc62015-5ea0-4b9a-bca6-9c6111fc8d2c>
CC-MAIN-2023-50
https://www.migrationdataportal.org/blog/remittance-costs-have-fallen-still-dont-meet-sdg-target
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.97063
181
2.734375
3
It’s World Mental Health Day. But how do you support your students’ mental health throughout the year? It’s so important to talk to young people about mental health, so they can help themselves and others. Our Make Life Kind Charity School Speakers can help! “World Mental Health Day (10 Oct) is a day to talk about mental health and show everyone that mental health matters. It’s also a day to let people know that it’s okay to ask for help, no matter what you’re going through. “As the theme of World Mental Health Day highlights, ‘mental health is a universal human right’. That’s why at Mental Health Foundation, we’re dedicated to addressing the inequalities in mental health and working towards good mental health for all, not just for some. “This year, over 260,000 people have had a Tea & Talk for World Mental Health Day – raising vital funds for mental health! Every donation supports our life-changing work and brings us closer to a world with good mental health for all.” – Mental Health Foundation Make Life Kind Charity Our community angle, Make Life Kind, is now officially a charity! Through Make Life Kind, we partner with an incredible team of School Speakers who cover stigmatised topics in education, such as: diversity, wellness, LGBTQ+, neurodiversity, disabilities, drug crime, knife crime… and mental health! So, how can we drive mental health and anxiety awareness into schools? Meet our Mental Health School Speakers Our Make Life Kind Charity was set up in collaboration with our team of incredible school speakers. On a mission to work together to fight stigmas and drive diversity, wellness and safety awareness into the education sector. Fighting all of the stigmas around mental health struggles, helping young people to thrive through adversity. Creating spaces where young people can find their superpowers, be limitless, and create their own champion mindset! Some of our speakers cover the theme of Anxiety, and all of them touch on mental health in some way. Book our Mental Health Speakers for your school! On a mission to break down the stigmas around mental health and encourage open conversations in safe spaces Meet the team: ⭐Thomas – Our Mental Health Coach Ex-professional rugby player, Thomas Minns, struggled with depression throughout his career, and now aims to fight stigmas around men’s mental health and sports. ⭐Shocka – Rapper & Mental Health Activist From music career, to mental health crisis to success again – Shocka is an advocate for fighting stigmas around schizophrenia and mental ill health… and proving that doesn’t define you. ⭐Abz – Our Neurodiversity Champion Suffering with his own mental health over the years, Abz educates on neurodiversity including ADHD, autism, bipolar, anxiety and much more – to challenge the stigmas. ⭐Loti – Our Diversity, Inclusion & Wellbeing Coach Mental health and wellbeing are key for young people – and Loti can help advise and educate on this. Using his lived experience with BPD, he’s passionate about fighting stigmas. ⭐Oly – Mental Health Teacher & OCD Advocate Through Oly’s own lived experience with severe OCD, Anxiety, ADHD, and Depression…. He speaks about how running saved his life and the different ways he’s learned to cope. And many more! Let’s fight stigmas around mental health together! Our school speakers are available for bookings in the next month or months in advance. Half days, or full day sessions – we work with you to create the most effective and engaging workshops for your students. Interested in booking one of our speakers? Or would you like more info about our Make Life Kind charity? Get in touch on [email protected] or [email protected] Or call us: 0333 360 1110
<urn:uuid:f30a05d7-a201-4d54-a638-1b9f7b7c9d98>
CC-MAIN-2023-50
https://www.milk-education.co.uk/2023/10/10/world-mental-health-day-book-our-mh-speakers-for-your-school/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.921855
859
2.734375
3
Vitis aestivalis (Summer Grape) |Also known as:||Silverleaf Grape| |Life cycle:||perennial woody| |Habitat:||part shade, sun; average to dry; deciduous woods, thickets, wooded bluffs| |Plant height:||to 70 feet| |Wetland Indicator Status:||GP: FAC MW: FACU NCNE: FACU| |MN county distribution (click map to enlarge):| |National distribution (click map to enlarge):| Pick an image for a larger view. See the glossary for icon descriptions. Cylindric clusters up to 6 inches long opposite the leaves of this year's new branches. Separate male and female flowers are typically on different plants, both 1/8 inch across or less with 5 green to yellowish petals that drop off early. Male flowers have 5 or 6 long, pale, erect to ascending stamens around a tiny button center. Female flowers have a bottle-shaped style and 5 short stamens that are usually sterile and somewhat contorted. The calyx cupping the flower is minute; flower stalks are minutely hairy and often red. Flowers are fragrant. Leaves and stems: Leaves are 4 to 8 inches long and about as wide, mostly broadly heart-shaped in outline, shallowly to deeply lobed with 3 or (usually) 5 major lobes and a broad gap between the 2 basal lobes. Deep sinuses between major lobes are often well-rounded. Edges are toothed, the teeth mostly rounded with a minute point at the tip. The lower surface is covered in a whitish, waxy bloom, which is often obscured by reddish-brown, cobwebby hairs; major veins are also densely hairy. The upper surface is dark green and hairless or becoming so. Leaf stalks are 2 to 6 inches long, often reddish, hairy, more densely so near the leaf blade and more sparsely near the stem. New branches are yellowish-green to reddish and hairy, the nodes covered in a waxy bloom. Forked tendrils develop opposite the leaves on first year branches, usually skipping every third leaf, and become woody with age. Older bark is brown to reddish-brown, hairless and shredding, peeling in long strips. A mature plant may have a trunk as much as 8 inches in diameter at breast height (dbh). Plants may climb high into trees or crawl over shrubs and lower vegetation. The flower clusters become dangling as fruit develops. Fruit is a round berry ¼ to ½ inch in diameter, ripens from green to blue-black, and is covered in a white bloom. Inside a berry are 2 to 4 slightly flattened, egg-shaped seeds. Berries are often sour until after a frost, then turn more sweet-tart. Summer Grape a rare species in Minnesota, limited to a few southeast counties along the Wisconsin border, where it reaches the extreme northwest edge of its range. Across its range, it's found in upland hardwood forest and forest edges, dunes, fencerows, and wooded bluffs, often in sandy soil and in areas of disturbance (natural or man-made). According to the DNR, biological surveys in the southeast over the last 20 years have only found 1 new location, bringing the total to 11 known populations, one of which was unintentionally destroyed in an effort to manage specific canopy trees. This illustrates the problem of managing an entire ecosystem as component parts rather than as a whole. Its habitat preferences in MN are not well understood and it was listed as a Special Concern species in 1996, elevated to Threatened in 2013. It can resemble the related Riverbank Grape (Vitis riparia), which has leaves with sharply serrated edges, lacks the cobwebby hairs and waxy bloom on lower leaf surfaces, and is ubiquitous in floodplain forests and woodlands throughout the state, where Summer Grape prefers drier habitats. Summer Grape leaves may also resemble another vine, Common Hops (Humulus lupulus), which does not have woody stems or tendrils, has opposite leaves, and a cone-shaped fruit rather than berries. There are 3 recognized varieties of Vitis aestivalis, distinguished by fruit size, degree of hairiness, the amount of waxy bloom and other traits; var. bicolor, a.k.a. var. argentifolia, is present in Minnesota. Note that the population we encountered had sparse glands on at least some new stem growth, but there is no mention of glands or glandular hairs in any of the available references. Please visit our sponsors Native Plant Nurseries, Restoration and Landscaping Services ↓ - Summer Grape vine - high-climbing vine - vine climbing over shrubbery - sparse glands on new stems - sparse hairs on lower leaf stalks - more leaves - budding flower clusters - new stem growth with red tendrils - leaf shape can be quite variable Photos courtesy Peter M. Dziuk taken in Houston County. Have you seen this plant in Minnesota, or have any other comments about it?
<urn:uuid:a0e92ec3-b034-42f8-ba29-f4fe2c2b7f03>
CC-MAIN-2023-50
https://www.minnesotawildflowers.info/shrub/summer-grape
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.943329
1,089
3.1875
3
The present work has been undertaken not only to provide an adequate treatment of the position of the sudras in ancient times, but also to evaluate their modern characterizations, either based on insufficient data or inspired by reformist or anti-reformist motives. Here an attempt has been made to present a connected and systematic account of the various developments in the position of the sudras down to circa A.D. 600. Since the sudras were regarded as the laboring class, in this study particular attention has been paid to the investigation of their material conditions has been paid to their economic and social relations with the members of the higher varnas. This has naturally involved the study of the position of slaves, with whom the sudras were considered identical. The untouchables are also theoretically placed in the category of sudras and hence their origin and position has also been discussed in some detail. About the Author
<urn:uuid:a0662e42-0ef0-4947-81d3-5cfabe7f4b0d>
CC-MAIN-2023-50
https://www.mlbd.com/product/sudras-in-ancient-india-a-social-history-of-the-lower-order-down-to-circa-a-d-600/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.982804
187
3.171875
3
Only one-third of adults have an estate strategy document such as a will in place, which may not be entirely surprising. No one wants to be reminded of their own mortality or spend too much time thinking about what might happen once they’re gone.1 But a will is an instrument of power. Creating one gives you control over the distribution of your assets. If you die without one, the state decides what becomes of your property without regard to your priorities. A will is a legal document by which an individual or a couple (known as “testator”) identifies their wishes regarding the distribution of their assets after death. A will can typically be broken down into four main parts. 1. Executors - Most wills begin by naming an executor. Executors are responsible for carrying out the wishes outlined in a will. This involves assessing the value of the estate, gathering the assets, paying inheritance tax and other debts (if necessary), and distributing assets among beneficiaries. It’s recommended that you name at least two executors, in case your first choice is unable to fulfill the obligation. 2. Guardians - A will allows you to designate a guardian for your minor children. Whomever you appoint, you will want to make sure beforehand that the individual is able and willing to assume the responsibility. For many people, this is the most important part of a will since, if you die without naming a guardian, the court will decide who takes care of your children. 3. Gifts - This section enables you to identify people or organizations to whom you wish to give gifts of money or specific possessions, such as jewelry or a car. You can also specify conditional gifts, such as a sum of money to a young daughter, but only when she reaches a certain age. 4. Estate - Your estate encompasses everything you own, including real property, financial investments, cash, and personal possessions. Once you have identified specific gifts you would like to distribute, you can apportion the rest of your estate in equal shares among your heirs, or you can split it into percentages. For example, you may decide to give 45 percent each to two children and the remaining 10 percent to a sibling. The law does not require that a will be drawn up by a professional, and some people choose to create their own wills at home. But where wills are concerned, there is little room for error. You will not be around when the will is read to correct technical errors or clear up confusion. When you draft a will, consider enlisting the help of a legal or financial professional, especially if you have a large estate or complex family situation. Preparing for the eventual distribution of your assets may not sound enticing. But remember, a will puts the power in your hands. You have worked hard to create a legacy for your loved ones. You deserve to decide what becomes of it. 1. Caring.com, 2023 The content is developed from sources believed to be providing accurate information. The information in this material is not intended as tax or legal advice. It may not be used for the purpose of avoiding any federal tax penalties. Please consult legal or tax professionals for specific information regarding your individual situation. This material was developed and produced by FMG Suite to provide information on a topic that may be of interest. FMG Suite is not affiliated with the named broker-dealer, state- or SEC-registered investment advisory firm. The opinions expressed and material provided are for general information, and should not be considered a solicitation for the purchase or sale of any security. Copyright FMG Suite.
<urn:uuid:a2c054cd-5195-4ef5-b741-32f426cfa3be>
CC-MAIN-2023-50
https://www.myitws.com/resource-center/estate/will-power
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.945108
734
2.78125
3
Sulfites are chemical preservatives used in a range of foods including beverages such as wine and beer. They are added to processed foods to increase their shelf-life and even to some medications to keep them stable. Sulfites can trigger allergic reactions in some people, mainly those having asthma. Sulfite-sensitive people often experience allergic reactions similar to those with food allergies. Image Credit: Miriam Doerr Martin Frommherz / Shutterstock Symptoms of sulfite allergy Symptoms of sulfite allergy can be mild to moderate and very rarely severe. Major symptoms of sulfite-sensitivity include the following: - Digestive symptoms - diarrhea, stomach cramps, vomiting, and nausea - Skin symptoms - red and itchy skin, rashes, and hives - Respiratory symptoms - wheezing, difficulty breathing, cough, chest tightness - Anxiety, paleness, and weakness - Anaphylactic shock - very rarely, a severe and fatal allergic reaction can cause low BP and extreme difficulty to breath, which might lead to loss of consciousness. Foods and medications containing sulfites Sulfites are present in foods such as Parmesan cheese, mushrooms, and some fermented foods. Preserved food and drinks such as wine, cider, beer, sausages, soft drinks, burgers, and dried fruits are usually high in sulfites. Sulfite might be hidden in salad dressings in the form of vinegar or bottled lemon juice, in pizzas that use processed tomato sauce, and in olives, sausages, and sauces. Fresh fruits and vegetables, fresh meat and fish, fresh dairy and freshly prepared sauces and dressings are generally considered free of sulfites. Sulfites are also added to many drugs - both over-the-counter and prescription drugs. It may be present in drugs prescribed for vomiting and nausea, antibiotics, psychotropic drugs, cardiovascular drugs, IV medications, medications for respiratory problems, pain relievers, steroids, and anesthetics. Sulfite in air Apart from foods and drugs, polluted air can be a source of sulfite too. Levels of sulfur dioxide can be very high in the air in the vicinity of oil and coal-burning plants and in polluted air on foggy days. Exposure to sulfur dioxide in the air can lead to bronchoconstriction even in normal individuals. In asthmatic individuals, even very brief exposure to sulfur dioxide can cause severe bronchoconstriction. Diagnosis and treatment of sulfite allergy Sulfite hypersensitivity is usually diagnosed using food exclusion and reintroduction. This method involves the removal of sulfite-containing foods for a period of time. These foods are gradually re-introduced to see the reaction they might trigger. Sulfite sensitivity is also diagnosed using a food challenge. This involves ingesting a very small amount of sulfite while the subject is under observation and close supervision by an allergist. In case there is no reaction, the amount of sulfite is slowly increased till a safe exposure level is reached. In case of any reaction, medication is given to reverse the symptoms. A skin prick test is also used to diagnose sensitivity to sulfites. Here the allergen is placed on the skin surface and a prick is made in that area. If there is any skin reaction such as bumps, that can be indicative of sulfite sensitivity. The only solution for a sulfite allergy is avoiding the specific allergen, sulfite. Sulfite-sensitive people should avoid foods with high levels of sulfite such as dry fruits, beer, wine, and processed foods. In order to avoid sulfite-containing foods, carefully reading product labels is very important. Ingredients to look for on food labels are potassium bisulfite, sulfur dioxide, sodium bisulfite, potassium metabisulfite, sodium metabisulfite, and sodium sulfite. People having asthma should be extremely careful with foods containing sulfite. Anaphylactic reactions as a result of sulfite ingestion will need immediate emergency treatment including an epinephrine injection, followed by other procedures and observation at the hospital. People with high levels of sulfite sensitivity must carry epinephrine with them all the time.
<urn:uuid:eaf7fbeb-5756-403d-97f2-a6eb707bab35>
CC-MAIN-2023-50
https://www.news-medical.net/health/Sulfite-Allergy.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.941238
869
3.0625
3
Self and Peer Assessment Self and Peer Assessment is a robust and straightforward method to build skills and improve communication in any group with a common interest or task. Here is an imaginary example for a team of leaders in an international NGO. Explain the objective of the work and the method to the team. The team lists (brainstorms), without evaluation, what successful leaders in their situation need to do to be effective. The team decides by each person having (say) three votes from the combined list the most important criteria. (The team needs to make the method manageable in the time available). Team members rate themselves against the criteria using a simple scoring system. (“10 “) I am outstanding at (say) accepting help. (“1”) I am poor at accepting help. The team members rate each other against the criteria. An example of the scores of a team member Here is an abbreviated example of what the scores of a member of a small team might look like. |Criteria||Member||Colleague 1||Colleague 2||Colleague 3| This step is critical. Team members seek and offer feedback and learning based on the scores. How to get value from the work For instance, in the example above, the team member might ask their colleagues to explain their evaluations where this is a mismatch between how that person sees her or himself and how others see that person. “You think I am better at accepting help than I do and much better at networking. Why is that? What am I doing that is working?” Positive feedback like this will build confidence. However, there is a gap the other way on adaptability. The team member could enquire about the reason for this observation and say, “It sounds like I am not as good at this as I think I am or could be. What could I do better? How can you help me?” Where the self and peer assessment scores are the same, it will be easy for the team member to ask for help. “We all agree I am average at delegation. You (Colleague 3 have a reputation and a score that says you are great at this! How do you go about it? Can you help me?” Give this time, so everyone assesses themselves and gives their feedback. The team members will realise that no one is perfect and can help each other. This work can create a learning culture. There is much more about this on the internet. It has been used widely in schools and further education but not much in the world of work.
<urn:uuid:5660fd8b-fb0b-4181-812b-421c8ebdf98d>
CC-MAIN-2023-50
https://www.nickheap.co.uk/exercises_page/self-and-peer-assessment/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.958928
539
3.453125
3
Tap on a feature to learn more. iPad, iPhone, Android, Mac, and Windows. Calvin's Commentaries is comprised of 22 volumes, including commentaries on 24 books of the Old Testament and all of the New Testament except for 2 & 3 John and Revelation. Calvin completed these commentaries in a 15 year span from 1540-1555. John Calvin, a prolific scholar and French theologian, was a pastor during the Protestant Reformation and a principal figure in the development of the system of Christian theology now known as Calvinism.
<urn:uuid:4069b9f7-6c41-47d5-beb6-3cfc69217092>
CC-MAIN-2023-50
https://www.olivetree.com/store/product.php?productid=17517&related_source_page=product_php&source=product_php_recommended_17140
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.943874
114
2.828125
3
Some older adults suffer from biologically based cognitive impairments in which the brain is so adversely affected by aging that it becomes very difficult for the person to continue to function effectively. Dementia is defined as a progressive neurological diseasethat includes loss of cognitiveabilities significant enough to interfere with everydaybehaviors, and Alzheimer’s disease is aform of dementia that, over a period of years, leads to a loss of emotions, cognitions, and physical functioning, and which is ultimatelyfatal. Dementia and Alzheimer’s disease are most likely to be observed in individuals who are 65 and older, and the likelihood of developing Alzheimer’s doubles about every 5 years after age 65. After age 85, the risk reaches nearly 8% per year (Hebert et al., 1995). 1 Dementia and Alzheimer’s disease both produce a gradual decline in functioning of the brain cells that produce the neurotransmitter acetylcholine. Without this neurotransmitter, the neurons are unable to communicate, leaving the brain less and less functional. Dementia and Alzheimer’s are in part heritable, but there is increasing evidence that the environment also plays a role. And current research is helping us understand the things that older adults can do to help them slow down or prevent the negative cognitive outcomes of aging, including dementia and Alzheimer’s (Pushkar, Bukowski, Schwartzman, Stack, & White, 2007). 2 Older a dults who continue to keep their minds active by engaging in cognitive activities, such as reading, playing musical instruments, attending lectures, or doing crossword puzzles, who maintain social interactions with others, and who keep themselves physically fit have a greater chance of maintaining their mental acuity than those who do not (Cherkas et al., 2008; Verghese et al., 2003). 3 In short, although physical illnesses may occur to anyone, the more people keep their brains active and the more they maintain a healthy and active lifestyle, the more healthy their brains will remain (Ertel, Glymour, & Berkman, 2008). 4
<urn:uuid:19c0c9c7-e15d-4bab-9de5-f5926282083b>
CC-MAIN-2023-50
https://www.opentextbooks.org.hk/ditatopic/26952
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.938966
427
3.546875
4
A new approach to self-help comfort measures in labor is based on observations of the real experts — women in labor. These observations have helped the authors simplify and individualize the labor-coping techniques described in Pregnancy, Childbirth, and the Newborn. The Three Rs: Relaxation, Rhythm, and Ritual Despite the variety of ways that individual women cope with the demands of labor, there are some basic similarities among women who cope well. “Coping well” means that they get through their contractions without being overwhelmed. Their behavior has these three things in common: Relaxation, Rhythm, and Ritual. These Three Rs, describe the essential, universal, instinctual behaviors of women in labor. Women who cope well in labor always use relaxation, either during or between contractions, or constantly. It is quite common for these women in early labor to allow their muscles to go limp during contractions, and to move about between contractions. Later in labor, some women may become more active during contractions (swaying, rocking) and relax and rest only between contractions. Others may remain very relaxed, still, and unresponsive to what is going on around them, both during and between contractions. Women who cope well rely on rhythm in any number of forms. For example, they may rhythmically breathe, moan or chant. They may rhythmically tap or stroke something or someone. They may rock, sway, or even dance in rhythm. They may even curl and uncurl their toes in rhythm! Or, they may want to be talked to, stroked, or moaned with, by someone else. Rhythmic activity calms the mind; it has a lulling effect. Although the word “ritual” is usually applied to religious or cultural activities, or to behavioral habits (such as “a morning ritual”), in this context “ritual” applies to the repetition of a meaningful rhythmic activity. Childbirth educators teach rituals for handling contractions that include relaxation, breathing, and attention-focusing. As labor progresses and becomes more intense, most women adapt or add to these learned rituals in ways that reflect their own personal coping styles and help them deal with the specific challenges of their particular labors. If a woman is free to move (change positions, walk, sway, rock), she will usually find a spontaneous ritual (usually adapted from what she learned in childbirth classes) which she will repeat precisely the same way contraction after contraction. If a partner is a part of the ritual, that person must also consistently repeat his or her part without changing it. The partner’s role might include eye contact, holding or touching, swaying with her, saying exactly the same words over and over, or counting breaths through each contraction. The ritual changes from time to time in labor. If a woman feels overwhelmed and unable to carry on a ritual, her partner, doula, or caregiver may help reestablish it. Such rituals show that women can adapt to the demands of labor and get through it. Excerpt from ©Pregnancy, Childbirth, and the Newborn, c. 2001
<urn:uuid:196505af-664c-44fd-a69c-e128307cb5cb>
CC-MAIN-2023-50
https://www.parenttrust.org/2018/01/27/2514-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.96011
649
3.0625
3
Children may face the same health risks as their parents during travel, but the health consequences can be more serious. For example, some illnesses can be difficult to recognize in children especially if they can’t talk yet to express what they are feeling, or children may be more likely to encounter health risks such as animals because of their size and curiosity. If you are planning to travel with children familiarize yourself with the information on this page to help everyone stay safe and healthy. Visit the CDC™ Traveling with Children page for helpful resources on travel including: - Safe food and water precautions, diarrhea management and insect protection when traveling abroad - Modifying the immunization schedule - Traveling while pregnant - Travel and breastfeeding - International adoptions
<urn:uuid:5e6fff75-8a12-4cc1-87ee-30cf8235fa27>
CC-MAIN-2023-50
https://www.pbpho.com/articles/staff.html/554578-traveling-with-children
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.943287
152
2.96875
3
The act of going to college and earning a degree is more important than ever to today’s youth and our society. Individuals with a bachelor’s degree earn much more than high school graduates, and society as a whole also gains from an educated citizenry. Unfortunately, access to a postsecondary education is not equal in America. Students historically underrepresented at the postsecondary level–students of color, those from low-income backgrounds, and first-generation students–are still less likely to prepare for, apply for, enroll in, and persist through postsecondary education. This study was conducted by the Educational Policy Institute through a grant from the Pew Hispanic Center to provide the most up-to-date analysis of Latino achievement through postsecondary education. The study analyses the latest installment of the National Educational Longitudinal Study (NELS), begun in 1988 with eighth grade students and followed up several times, with the last follow-up survey in 2000: eight years after scheduled high school graduation. This report outlines the pathway to and through postsecondary education for Latinos and other students, and looks at a number of variables which offer insight into how motivated and prepared these students are for postsecondary work.
<urn:uuid:6d78b51a-2aec-4c47-9a1a-857f49ec1675>
CC-MAIN-2023-50
https://www.pewresearch.org/hispanic/2004/06/23/latino-youth-and-the-pathway-to-college/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.956648
242
3.21875
3
Ramifications of shortages can be severe, but the FDA and ASHP have suggested solutions. The United States currently faces about 200 drug shortages. A drug shortage—a supply issue that affects how a pharmacy prepares or dispenses a medication—has an impact on patient care when clinicians must use alternative agents, according to the American Society of Health-System Pharmacists (ASHP).1 The crisis pervades all health care aspects and specialties. Although drug shortages historically involved mostly chemotherapeutic agents, the crisis has expanded to areas such as anesthesiology, critical care medicine, infectious disease, neurology, and nutrition.2 In October 2019, the FDA issued a report, “Drug Shortages: Root Causes and Potential Solutions,” to identify the etiologies of shortages and provide recommendations to address them long term.3 The crisis is multifactorial and complex in nature but attributable to the lack of incentives to produce medications that are less profitable, the lack of a system to reward manufacturers that make high quality products, and regulatory challenges that hinder recovery and growth. Most drug shortages affect generic injectable formulations because of their minimal profit margin to make such basic medications.1,4 Of note, 90% of a given drug’s total supply comes from just 1 manufacturer, and 3 manufacturers supply 71% of the market.5,6 If 1 facility runs out of raw materials or has problems with its production line or the quality of products, that single company’s issues will drastically affect the entire supply chain. Because of the complexity of manufacturing and the high cost of production, seldom are there new suppliers to replenish the necessary drugs in a reasonable amount of time. For example, one of the longest and worst drug shortages involves intravenous fluids (IVFs), such as normal saline 0.9% and dextrose 5%.7 IVFs are used for hydration therapy in all areas of hospitals and in the most basic form of drug reconstitution and preparation by pharmacy technicians. In a given month, a community hospital may need 20,000 bags of normal saline for its daily operation. Impact of a Natural Disaster Consider the September 2017 case of Hurricane Maria’s devastation of Puerto Rico, where the majority of the US drug facilities were located. With the bulk of the supply chain wiped out by an unforeseeable natural disaster, drug shortages worsened because existing facilities could not increase production to meet the demands. Hurricane Maria highlighted the need for “contingency plans and enhanced redundancies in production and distribution” recommended by ASHP in its drug shortage roundtable held in November 2017. 8 Quality issues were also identified as a root cause of the drug shortage crisis. The FDA issues Form 483 to facilities at which problems are uncovered during site visits. Some of these problems include adulterated ingredients, microbial contamination of raw materials, and particulates in final products. Because the margins for error are slim, some manufacturers claim that they cannot afford to invest more resources to meet quality standards, remodel old buildings, and replace outdated machinery. Similar quality issues have been found in facilities located in other countries that export medications to the United States. In February 2014, a New York Times article highlighted the safety of medications made in manufacturing plants in India. The country is the second-largest exporter of medications to the United States, and its facilities have been implicated in falsifying data and selling counterfeit medications, among numerous other quality-related problems.9 Another root cause of drug shortages involves “logistical and regulatory challenges” that make it difficult for the market to recover after a disruption, according to the FDA analysis of the crisis. It described the supply chain as becoming “more complex and fragmented,” stating that even the seemingly simple task of increasing production may need approval from numerous regulatory agencies. Consequently, at the end of the round-table with health care professional organizations and policy makers, ASHP urged greater transparency regarding the causes of shortages and their expected durations, as reported by the manufacturers. The ASHP report also recommended legislation that would establish incentives to encourage manufacturers to produce drugs in shortage, rewarding those that develop contingency plans to maintain a supply in the event of a manufacturing disruption. One such drug manufacturer, Civica Rx, aims for transparency in its contracts, location, operation, pricing, and production practices. As stated on its website, the company’s goal is to “be a model generic drug company by providing high-quality FDA approved products at affordable prices” to “ensure that essential generic drugs are available and affordable Effect on Day-to-Day Operations As a clinical pharmacist specializing in pediatric emergency medicine, I am affected by drug shortages on a daily basis. Besides managing my regular duties of attending codes, educating the health care team and patients, optimizing medication regimens, providing therapeutic recommendations, and working with a multidisciplinary team in the emergency department (ED), I also have to respond to drug shortages, which have become the norm of hospital pharmacy operations. Because this task involves discussion with multiple key drivers, including management, nurses, patients and their family members, pharmacy buyers, and prescribers, the process is cumbersome and time-consuming, diverting valuable attention and time from meaningful patient care activities. Furthermore, dealing with a drug shortage may delay treatment and increase medication errors, because the staff is unfamiliar with alternative products that have different concentrations, labeling, and packaging. Medication errors can happen in the process of prescribing, verification, compounding, dispensing, and administration. Uncertainty about and unfamiliarity with new products may affect medication safety and, ultimately, patient care. In the worst-case scenario, these alternatives may be less effective or more costly; lead to disease progression, relapse, or treatment failure; or produce more toxic adverse drug reactions. Mazer-Amirshahi et al looked at the effect of these drug shortages specifically in the ED setting.11 The article noted common ED classes of medications in critical shortage, such as analgesics, antiemetics, antimicrobials, benzodiazepines, and electrolyte solutions. Two examples that may pose a threat to public health are influenza and oseltamivir shortages. The authors discussed several cases of compounding errors and compromised sterility, as well as increased costs and resource use. Pediatric patients are particularly vulnerable. For example, the zinc shortage resulted in more dermatitis cases at Children’s National Hospital, and the shortage of cefotaxime to treat neonatal fever/sepsis led to greater use of aminoglycosides, which carry the risks of nephrotoxicity and ototoxicity, as well as additional laboratory draws and increased cost, labor, and pain to monitor the drug’s pharmacokinetics.12 Moreover, because of the lack of available dosage forms, pediatric patients need individualized dosing that requires calculations and extemporaneous compounding. The drug shortage crisis poses an even higher risk of medication errors and adverse events for these patients because there are more challenges with delivery systems and administration. Because market forces do drive production as it pertains to drug shortages, the ASHP roundtable report encouraged the Federal Trade Commission to scrutinize mergers and their impact on drug production and shortages as they ultimately affect patient care. For example, when Pfizer acquired Hospira, the merger spawned questions about future production and continuation of certain products. Specifically, Hospira was 1 of the few manufacturers left to produce lifesaving medications, such as epinephrine, sodium bicarbonate, and dextrose 50% vials and carpujects, critical medications used in resuscitation efforts and other medical emergencies. Any delay in receiving these agents because of drug shortages and time to gather therapeutic alternatives can lead to a delay in correcting life-threatening electrolyte imbalances, reversing multiorgan damage and cardiac perfusion. Finally, consider this: If we can pass legislation to ban something as simple as plastic straws in restaurants and plastic bags in grocery stores to reduce plastic use, can’t we resolve shortages of lifesaving medications for our sickest, most vulnerable patients? I would like to thank Victoria Adams Serrano, PharmD, FASHP, for her guidance and help with this article.
<urn:uuid:dab48520-05ed-447c-b209-ee46383f23fe>
CC-MAIN-2023-50
https://www.pharmacytimes.com/view/the-drug-isnt-available-so-what-now
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.939337
1,700
3.171875
3
Mechanical engineering technicians are responsible for the efficient working of many kinds of equipment and machinery. This involves the design, manufacture, testing, installation, adjustment and maintenance of equipment. They might work in manufacturing, power, building services or transport. You could be: working on new designs using computer-aided design (CAD) software constructing test equipment and working models installing, testing, setting and adjusting equipment which controls production in manufacturing industry – perhaps including robotic machinery organising and putting into practice repair and maintenance programmes for equipment and machinery diagnosing and repairing faults in equipment of various types – perhaps including the mechanical parts of lifts and escalators or railway locomotives overseeing the manufacturing process and making sure that items – small components or large parts for power stations – have been made to the right standard looking for ways to improve manufacturing operations planning production schedules, purchasing materials or carrying out quality control. The figures below are only a guide. Actual pay rates may vary, depending on: where you work the size of the company or organisation you work for the demand for the job. A Modern Apprentice may start on the National Minimum Wage (NMW). The apprentice rate, for those aged under 19 or aged 19 or over and in the first year of their apprenticeship, is £5.28 an hour (1 April 2023). Some employers may pay their apprentices more. Starting salaries for qualified mechanical engineering technicians are normally in the range £19,000 to £24,000 a year. With experience this can rise to around £40,000 a year. You might work in a laboratory, office, factory or workshop. The conditions will depend on the industry, but in some cases they may be dirty and noisy. In factories and workshops you would normally wear overalls and perhaps also safety glasses, protective headgear and footwear. You may have to work shifts, do overtime and be on call outside normal working hours. You might have to travel to visit customers and carry out repairs and maintenance. You could complete the Engineering Foundation Apprenticeship (FA), while in S5 or S6 at school. Entry requirements vary between colleges, but you usually need 3 subjects at National 5 including English and Maths. Some colleges also ask for Physics. You could enter through a Modern Apprenticeship in engineering. For entry you would normally need 3 subjects at National 4 or 5, usually including English, Maths and a science or technological subject. You will have to take an aptitude test. Or you could first take a qualification in mechanical engineering or a similar subject. Relevant courses include NC, NQ (SCQF Levels 4-6), HNC (SCQF Level 7) or HND (SCQF Level 8). For entry to an NC or NQ course you need some subjects at National 5. For an HNC or HND course you need 1-3 Highers. You should normally have English, Maths and at least one science or technological subject at National 5 or Higher. You may be able to qualify by other training routes. Mechanical engineering technicians work in engineering and manufacturing companies, and in other organisations which use a lot of machinery. There are jobs in a wide range of industries including water, gas, electricity, railways, defence, armed forces, chemicals, plastics and food processing. There are also opportunities with public bodies such as local authorities and the National Health Service (NHS). A Modern Apprenticeship combines on the job and off the job training and leads to an SVQ (SCQF Level 6). There are SVQs in Performing Engineering Operations, Process Engineering Maintenance (Mechanical) and Mechanical Manufacturing Engineering. Which you take depends on the work you do. If you do a college course first, you would then take a job with an employer and continue with further training to gain SVQs. After your apprenticeship or college course and further training with your employer, you can work towards registering as an Engineering Technician (EngTech) with the Engineering Council. If you do not follow either of the above training routes, you may still be able to achieve EngTech by another approved route. You can check these alternative routes with the Engineering Council or with the relevant professional engineering institution. You must be willing to keep up to date with new advances in technology. With experience, you may be promoted to supervisor level. You might move into management later. You might move into related areas such as marketing and sales or after sales service. Technicians usually work under the general supervision of professional mechanical engineers. With further study and training, technicians can progress to become mechanical engineers at the higher levels of Incorporated Engineer (IEng) and Chartered Engineer (CEng). The Engineering Council sets and maintains the standards of the engineering profession in the UK. It does so through 35 professional engineering institutions which are Licensed Members of the Engineering Council. The Science, Engineering and Manufacturing Technologies Alliance (SEMTA) is the Sector Skills Council for science, engineering and manufacturing technologies.
<urn:uuid:bf916c79-0d73-422a-8e01-e00144b6c032>
CC-MAIN-2023-50
https://www.planitplus.net/JobProfiles/View/496/54
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.948739
1,046
2.78125
3
Your cookie preferences Cookies are small text files with information stored on your device, i.e. your computer, mobile phone, tablet, etc., when you visit a website. A cookie will typically contain the name of the site that the cookie came from, how long the cookie will be stored and a number (usually a randomly generated unique number). Cookies are used to make websites work more effectively but also to provide certain information to the owner of a website. Cookies make it possible to distinguish different users from each other, which can give each user a more personalized and positive experience of the website.
<urn:uuid:e05dc579-4434-40ab-87f7-f90f343e1526>
CC-MAIN-2023-50
https://www.play.net/playdotnet/cservice/web_comments.asp?gameName=gs4&webVersion=2.50.00&pageName=%2Fgs4%2Finfo%2Ftomes%2Fdeities%2Flumnis_history.asp%3Fcookieprefs%3D1%26amp%3Bcookieprefs%3D1%26amp%3Bcookieprefs%3D1
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.906289
120
2.875
3
June 11, 2021 7 min read An eclipse is indeed a spectacular sight where the Moon casts a dark shadow that plummets you into incredible dusk and the bizarre and extraordinarily beautiful halo is reflected. But these eclipses are much more than just a breath-taking view. Several hundred years ago, when people looked at the Moon closely during an eclipse, they observed the shadow of Earth overlapping the Moon and found out that the Earth is spherical. Scientists across the world use eclipses as an opportunity to study more about the Sun, Moon, and Earth. Throughout history, there are also a number of spiritual theories surrounding eclipses. Koreans, Chinese, Hindus, Vikings, and other cultures viewed it as a period when the sun is being devoured by a celestial dragon. However, these notions were busted by scientists as they were mere superstitions with no relevant text claiming the latter. Eclipse season is seizing the world with a total of 4 eclipses occurring this year. Two weeks after the lunar eclipse on May 26th, the Moon, Earth, and Sun again aligned on June 10th. An eclipse occurs when one celestial body such as a Moon or planet falls into the shadow of another celestial body. Two popular types of eclipses can be observed from Earth: Leading scientists and astronomers explain that the upcoming eclipse will be a partial and annular solar eclipse, illustrating a stunning panorama known as the ‘Ring of Fire’. A solar eclipse happens when the Moon moves between the Earth and Sun. When this happens, the Moon stops the sunlight from reaching the Earth and its shadow falls on Earth's surface. A solar eclipse only occurs during the new moon phase. There are three types of solar eclipse: In India, only a partial solar eclipse was visible from Arunachal Pradesh and Ladakh. People living in the northern hemisphere stood in the path of the eclipse and got the chance to witness the legendary ring of fire which lasted for about 100 minutes. Millions of people from all across the world gaped at the jaw-dropping view, which came out as a luminous 'Death Star' in the night sky. Astrophotographers and eclipse enthusiasts captured mesmerizing pictures of the stellar manifestation. Here are some startling and absolutely gorgeous images of the solar eclipse 2021: Safety check: Remember, never look directly at the Sun during an eclipse. It can permanently cause harm to your eyes! You can use protective eyewear like a pair of binoculars or welder's glass to momentarily glance at the eclipse. If you're someone who enjoys reading about astronomical events and the solar system, we have some insightful content for you at Practically. The learning app offers an immersive experience enriched with simulations, AR experiences, 3D videos, and much more. Experience and learn more about the solar system through life-like videos and live lessons and test your abilities with Practically. Come join us and Learn Practically! That's it for today in our series, The Cosmic Saga. We will soon be back with another round of uncovering more about the celestial world. Till then, stay tuned! #eclipse #totaleclipse #solareclipse #eclipseseason #solareclipse2021 #eclipse2021 #mooneclipse #bringlearningalive #learnpractically #learningapp #practicallyapp Join Thousands of Other Practically Learners! Have a Doubt? Discuss with teachers.
<urn:uuid:0beaf368-7968-40e1-b9ef-0e4890751f56>
CC-MAIN-2023-50
https://www.practically.com/web/solar-eclipse-explained-practically-the-beauty-and-science-of-eclipses.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.926569
708
3.203125
3
NodeJS is a rapidy growing web server technology, and Node developers are among the highest paid in the industry. Knowing NodeJS well will get you a job or improve your current one by enabling you to build high quality, robust web applications. In this course you will gain a deep understanding of Node, learn how NodeJS works under the hood, and how that knowledge helps you avoid common pitfalls and drastically improve your ability to debug problems. You'll learn how asynchronous code works in Node and the Node event loop, as well as how to use the event emitter, streams, buffers, pipes, and work with files. We'll see how that leads to building a web server in Node. We'll dive into web sites, web apps and APIs with Express and learn how Express can save us time as Node developers. You'll also gain an understanding of npm, connecting to databases, and the MEAN stack! NodeJS doesn't have to be hard to learn. The biggest mistake most coding tutorials make is expecting someone to learn simply by imitating others' code. Real world situations are never exactly like the tutorial. I believe the best way to learn is to understand how a tool works and what it does for you, look at examples, and then try it yourself. That's how this course is built, with the goal to help you both learn and understand NodeJS. Note: In this course you'll also get downloadable source code. You will often be provided with 'starter' code, giving you the base for you to start writing your code, and 'finished' code to compare your code to.
<urn:uuid:4f5b5d28-10e4-4d9b-892d-cd07e3b2045b>
CC-MAIN-2023-50
https://www.programdoc.com/course/learn-and-understand-nodejs
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.941414
330
3.09375
3
Introduction to Radical Behaviorism As one of the branches of the psychological school of Behaviorism, Radical Behaviorism operates on the fundamental premise that "behavior" is at the core of psychological study. Whereas other branches such as cognitive psychology might focus on internal considerations such as patterns of thoughts, obsessive preoccupations, or the manifest content of one's dreams, Behaviorism looks only at the "observable" phenomenon of outward behavior. It is believed that this emphasis lends psychology an "experimental" facet that puts it more in line with the "hard" or "objective" sciences, like physics. That said, Radical Behaviorism is "radical" because it takes the Behavioral standard even further. Instead of merely rejecting private events and internal processes such as thought and emotion as largely irrelevant to psychological study, Radical Behaviorism asserts that a comprehensive psychological perspective must take these phenomena into account. However, these processes are seen not as explanations for behavior, but rather as examples of behavior in and of themselves, subject to Behavioral explanations. The first psychologist to actively promote this point of view was B.F. Skinner. In his work, "About Behaviorism", he goes against the grain of other popular psychological perspectives by stating that introspection has no explanatory value at all, but rather that what one finds through introspection is only "collateral products" of one's "genetic and environmental histories." Behavior and Determinism If Skinner's take on Behaviorism is true, then it has a profound implication for our concept of action and free will. If even internal actions such as the thoughts we think and the dreams we dream are products of our interactions with our environment, then they can be seen as "pre-determined". Given a broad enough perspective and great enough insight, one could look at an individual's environmental and genetic history and be able to accurately intuit not only how that individual would behave, but also what that individual was thinking. Naturally, many are unprepared to accept this conclusion. At the same time, however, it's worth noting that some have attempted to recast the perspective of radical behaviorism in a "more acceptable" terminology. For instance, in 1990, the psychologist Hineline posited that one could, without violating the fundamental tenets of Skinner's approach, view the organism as "the locus at which behavior and environment interact", a role in which autonomy is not immediately and explicitly denied.1 Differing perspectives on the implications of radical behaviorism were made possible largely because of the broad utility of Skinner's newly developed experimental process which he called "operant conditioning". Whereas classical conditioning deals only with a unilateral relationship of stimulus and response, operant conditioning proposes a more cyclical relationship in which one's behavior operates upon one's environment, and the consequences brought about by that environment naturally determine how likely that behavior is to be repeated in the future. Through a number of experiments, Skinner showed how behavior could be influenced through operant conditioning. He used two types of stimuli, both positive (pleasing to the subject) and negative (unappealing to the subject) to produce one of two desired effects (the continuation or cessation of a particular behavior). Depending upon the outcome (whether the behavior was increased or decreased), the stimuli are said to be "reinforcers" or "punishers". If one attempted to increase a behavior through adding a positive stimulus, or by removing a negative stimulus, this was known as positive or negative reinforcement. If, by contrast, one attempted to decrease a behavior through removing a positive stimulus or adding a negative stimulus, this was known as positive or negative punishment. The overall finding of studies in operant conditioning is that reinforced behaviors (whether positive or negative) are highly likely to be repeated. In a certain sense, these findings do help to bear out Skinner's deterministic views: if we know that an individual is more likely to repeat a behavior, isn't this a form of predicting the future? Radical Behaviorism is considered "radical" precisely because it undermines many popular presumptions about human nature and how the universe works. While most people easily accept the basic tenet of Behaviorism (that studying behavior can reveal psychological insights) they resist when this premise is taken to its extreme conclusions. As above, many of Skinner's detractors felt that the deterministic conclusions of his work were reason enough to reject its validity. After all, free will seems to be self-evident; most people feel as if they are in control of their behavior and thoughts, regardless of environmental or genetic history. In 1959, famous linguist Noam Chomsky published a book critical of Skinner's views, claiming that the development of functionally similar linguistic structures and modalities across culturally and environmentally diverse populations was evidence for an instinctual and innate aspect of language. Expounding further upon this proposed weakness in the radical behaviorism perspective, Chomsky's text would go on to be instrumental in shifting popular support from behaviorism towards cognitive psychology.2 Another point of contention, however, comes from the ethical implications of Radical Behaviorism. If, in fact, all behavior is dictated by operant conditioning in one form of another, this renders that behavior meaningless for many people. In other words, if someone is conditioned to be kind and charitable, these virtues mean less than they do if a person behaves that way because of a conscious moral choice on their own part. Remember, even if a person says to themselves, "I want to be kind", Radical Behaviorism would claim that this thought arose deterministically, because of that person's being conditioned by their environment. For many, the amoral and deterministic world described by Radical Behaviorism is one they just cannot accept. It is worth noting, however, that the majority of criticisms against Skinner's work tend to focus on philosophical and metaphysical matters. As far as the practical effectiveness of operant conditioning goes, it has proven to be a widely successful theory. Over the years, Skinner's work has led to major strides in the study of learning and can very often be found in classrooms. Drawing from the idea of reinforcement leading to a change in behavior, for instance, educators use reinforcement in the form of feedback, grades, repeated instructions, and so on, to predictably produce the desired behavior of learning in their students. Most notably, radical behaviorism has influenced the treatment of children with autistic spectrum disorders. As recently as 2007, a clinical report from the American Academy of Pediatric reaffirmed the usefulness of behavioral analysis as a means of communication with non-verbal autistic children.3 The effectiveness of Radical Behaviorism in predicting and controlling behavior has also led to operant conditioning becoming very popular within the home. Although parents might not even know the term "operant conditioning", they usually employ the practice in raising their children.4 For example, if Jennifer is given a reward for cleaning her room, this is positive reinforcement and she is likely to repeat the behavior. If John begins to speak more quietly indoors in an effort to avoid the negative stimuli of "time-out", this is negative reinforcement, and he's likely to repeat the quiet behavior. Radical Behaviorism, like any psychological perspective, can give us a great deal of insight into why people think and behave the way they do. Even if one rejects the philosophical and metaphysical implications of Skinner's work, they are still of obvious practical benefit in behavior management, and have proven quite effective in a therapeutic environment for some time. - Radical Behaviorism is called "radical" because instead of rejecting the study of private events, it considers these (thoughts, emotions, etc.) to be just another form of behavior. - Thusly, it asserts that thoughts and feelings, as well as outward behavior, are determined by one's environment through the process of operant conditioning. - Operant conditioning predictably increases or diminishes behavior through the use of positive and negative stimuli (called "reinforcement" or "punishment", depending on how they are employed). - Many people believe that operant conditioning has profound implications for the question of free will, asserting that if behaviors (including thoughts) can predictably be evoked or inhibited by environment, then all thoughts are determined. - For others, this extends even further into the sphere of ethics and morality. For these critics, if a "good" action is determined by environment rather than by moral choice, it ceases to be "good" in any meaningful sense. - Nevertheless, regardless of one's philosophical views, operant conditioning has proven very useful from both an experimental and philosophical viewpoint. For instance, it is popularly used in an educational context by teachers and within the home by parents.
<urn:uuid:13fb57c8-2e63-46bf-8210-98c36e53e6fa>
CC-MAIN-2023-50
https://www.psychologistworld.com/behavior/radical-behaviorism
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.958993
1,760
3.15625
3
Over the last 30 years, the health needs of lesbian, gay, bisexual, transgender, and queer Americans have become increasingly recognized, in particular for the ways in which they are distinct from those typically assessed and addressed in society. Universities and researchers are paying greater attention to LGBTQ public health issues and how they might adapt existing methods to research marginalized communities, but–until now–there has been no authoritative resource to guide their education or practice. Developed for graduate students in public health and health sciences–but perfect for anyone interested in this topic–this book will fill that gap and provide the necessary public health tools to teach about and study LGBTQ populations effectively. Divided into three sections and edited by top scholars, LGBTQ Health Research explains research methods important to descriptive epidemiology that are needed to document health disparities among LGBTQ populations. The book also examines research methods that help explain the driving forces of these disparities. Focusing on real-world experience in developing and testing interventions to mitigate health disparities in LGBTQ populations, it also breaks down issues that challenge the direct application of standard research methods with these communities, including those related to sampling, measurement, choice of theoretical variables to explain the distribution of health and illness, cultural competence in intervention design, and community participation. Promoting the creation and diffusion of effective interventions, the book takes a holistic approach to address longstanding research gaps regarding important marginalized communities. It also documents profound health disparities in many LBGTQ populations across a wide range of health conditions and explains why future development of the field must be based on inclusive science and rigorous research methods. LGBTQ Health Research is an essential textbook for any courses that deal with the intersection of marginalization, health, sexuality, and gender. Contributors: José A. Bauermeister, Chris Beyrer, Kerith Conron, Brian Dodge, Rita Dwan, Stephen L. Forssell, Peter Gamache, Gary W. Harper, Mark L. Hatzenbuehler, Colleen Hoff, Carl Latkin, Ilan H. Meyer, Robin Lin Miller, Angulique Y. Outlaw, Christopher Owens, Tonia Poteat, Erin Riley, Joshua Rosenberger, Ayden I. Scheim, Shauna Stahlman, Randall Sell, Ron Stall, Rob Stephenson, Rachel Strecher, Ryan C. Tingler, Karin E. Tobin, Ronald O. Valdiserri, and Richard J. Wolitski
<urn:uuid:07a99a39-17ef-4941-9941-11baf41c298c>
CC-MAIN-2023-50
https://www.queerbooks.com/product/lgbtq-health-research-theory-methods-practice/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.908656
487
2.71875
3
There are currently over 700 unidentified remains in the RCMP's national database of missing persons and unidentified remains. Without knowing their identities, it's impossible to return them home. With the help of a unique partnership, the RCMP is giving a face to some of these people, in the hopes of unlocking the mystery of who they are. For the first time, the RCMP is partnering with the New York Academy of Art to reconstruct the faces of Canadian unidentified human remains. From January 6 to 10, the Academy is hosting a forensic sculpture workshop, using 3D printed versions of 15 real skulls supplied by the RCMP. Academy students will put their anatomical knowledge and artistic skills to work in order to reconstruct each of the faces with clay. The skulls' journey to New York began with the British Columbia Coroners Service and the Nova Scotia Medical Examiner Service, which provided the skulls for this initiative. Technicians from the National Research Council (NRC) flew to British Columbia and Nova Scotia to scan the skulls. Back in Ottawa, NRC specialists printed 3D versions of the skulls using powdered, laser-melted nylon. The skulls were printed in batches of four, with each batch taking approximately 48 hours to complete, including cooling time. Once cooled, the skulls were cleaned using a combination of brushes and compressed air to remove residual nylon powder. NRC staff used dental picks when necessary to clean the tiniest nooks and crannies. During the week of January 6, the RCMP will be documenting the entire process on its social media channels, beginning with the scanning process and ending with a completed reconstruction. Following the week-long workshop, 15 new faces will be revealed and will be featured on the Canada's Missing website, in the hopes of generating tips from the public that could tell us who they are and giving some closure to families. The RCMP hopes to eventually bring this type of workshop to Canada, to build facial recognition capacity here and bring more people home. "The RCMP is very excited about this partnership with the New York Academy of Art. This was a unique opportunity to have 15 Canadian faces reconstructed in a single week. The Academy is world-renowned for its teaching techniques, and we look forward to benefitting from the work of its talented students. We hope to give a face and a name to people whose loved ones don't know what happened to them." "The forensic sculpture workshop at the New York Academy of Art, originally developed in partnership with the New York City Office of the Chief Medical Examiner, has reconstructed dozens of faces of unknown persons from discovered remains all over the US. In 2020, we are excited to partner with the Royal Canadian Mounted Police to work on Canadian unknown persons. The Forensic Sculpture initiative is both a unique merging of art and science and extraordinarily meaningful for our artists." - The RCMP maintains Canada's Missing, which is a public database of missing persons and unidentified remains. Cases are added to Canada's Missing at the discretion of the lead investigator. - The 15 Canadian skulls are all male, and were located between 1972 and 2019. These particular skulls were chosen for this initiative because they were in the best overall condition. - The New York Academy of Art has been hosting its forensic sculpture workshop annually since 2015. - Since 2015, four visual identifications have been directly attributed to facial reconstructions performed during the workshop.
<urn:uuid:4a46de24-9122-4eb9-ad7f-3c5451912fcd>
CC-MAIN-2023-50
https://www.rcmp-grc.gc.ca/en/news/2020/rcmp-partners-new-york-academy-art-identify-the-lost
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.963345
680
2.703125
3
Treatment of a mini stroke The term “mini-stroke” refers to a Transient Ischemic Attack (TIA). A mini-stroke is a cerebrovascular accident which causes stroke symptoms, but the symptoms disappear within one to two hours. The transient incident does not cause permanent brain damage. When stroke symptoms occur, there is no way of knowing if the cause is a TIA or a full stroke. Call 911 or the local number for emergency medical services, even if the symptoms disappear within minutes. Because mini-strokes can be caused by hardening of the arteries, atherosclerosis, a TIA may also indicate an increased risk for heart attack. Rarely, a mini-stroke may be caused by bleeding in the brain. Initial diagnostic tests will determine the cause of the TIA. Treatment of mini-stroke is intended to prevent a major stroke. Almost 20% of patients who experience a mini-stroke, if untreated, will have a major stroke within 90 days. Anti-coagulants or “blood-thinners” are given, often for long-term use. Aspirin is most often prescribed for patients who have had a mini-stroke. Aspirin affects the platelet cells in the blood, decreasing their ability to join together and form clots. If a patient already on aspirin therapy has a TIA, then a combination drug of aspirin and dipyridamole called Aggrenox may be prescribed. Other drugs such as Clopidogrel, heparin, or Coumadin may also be used. It is extremely important to take these medications exactly as prescribed. Report any side effects at once. Make certain that all doctors and pharmacists are aware of all medications taken. Anti-coagulants are powerful drugs, and may interact with other medications, even over-the-counter drugs. If blockages in the carotid arteries are found, a surgical procedure called carotid endarterectomy may be recommended to remove the blockages and widen the arteries. Sometimes a device called a stent is implanted, to help keep the arteries open to allow adequate blood flow to the brain. Most risk factors for stroke can be controlled by medications. The major risk factor is atrial fibrillation, a disorder of the heart’s rhythm. A patient with atrial fibrillation will be referred to a cardiologist for evaluation and treatment options. Other risks include diabetes, high cholesterol, family history of stroke and high blood pressure. Obesity, tobacco use and excessive alcohol consumption are risk factors for atherosclerotic heart disease, which can lead to stroke. Prompt treatment of stroke can prevent disability and tragedy. A mini-stroke is a major warning. Do not ignore it!
<urn:uuid:79667e22-058c-43d3-839c-00372068a931>
CC-MAIN-2023-50
https://www.rehabchicago.org/treatment-of-a-mini-stroke/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.924019
572
3.15625
3
Political scientists seek to understand events and processes in one place through juxtaposing them with their contemporary equivalents in at least one other society. So much of the reason we teach comparative politics courses is so that students can compare and contrast political systems elsewhere to our own and perhaps consider potentially adapting some of their features to our own federation. Russia has a complicated asymmetrical federal structure. There are 85 units, all called “subjects of the federation.” The main grouping is the 46 oblasts, usually named after their main city, for example Sverdlovsk or Volgograd; they have a predominantly ethnic Russian population. They are simply territorial subdivisions, like American or Brazilian states, with no ethnic connotations. The same is true of the nine krais, such as Kamchatka or Krasnodar. They are named differently than oblasts because they are found in outlying, frontier areas, mainly in Siberia. A Canadian parallel might be Yukon. Then there are units with a distinct ethnic basis, named republics, which enjoy more autonomy than the other types of jurisdictions. These 22 republics range from big ethnic entities named for a “titular” nationality, such as Chechnya and Tatarstan, down to tiny entities created as homes for smaller ethnic groups. Some of the latter are even enclaves found within the regular oblasts or krais. For example, Adygea is one such entity, representing the indigenous Adyghe people. It is the fifth-smallest Russian federal subject by area, with its territory situated within Krasnodar Krai. Each region, regardless of its status, has an elected leader — in oblasts and krais, governors or the heads of administration; in republics, usually presidents of the republic. Regardless of type or size, all 85 “subjects” are represented by two delegates each in the Council of the Federation, the 170-seat upper house of the Federal Assembly, the Russian parliament. The lower house, the State Duma, with 450 members, is an elected body, with representation by population. In my course on the Russian political system, I introduced the students to this complex system. Then I brought to their attention the ill-fated 1992 Charlottetown Accord, in which Aboriginal peoples were to have been a “third order of government.” The Charlottetown Accord would have substantially altered the status of Aboriginal groups in Canada. Under the Accord, an Aboriginal right to self-government would have been enshrined in the Canadian Constitution. Moreover, the accord would have recognized Aboriginal governments as analogous to the federal government and the provinces. There was provision for Aboriginal representation in the Senate, and Aboriginal senators would have had the same role and powers as other senators. Aboriginal legislation, however, would have been required to be consistent with the principles of “peace, order, and good government in Canada,” and would have been subject to judicial review under the Charter of Rights and Freedoms. Beyond these general principles, the Charlottetown Accord did not provide any details on the precise form that such self-government would have taken. Further, it provided for a breathing period before they could access the right to self-government. This would have allowed the federal government and the provinces time to negotiate the details. But how would this have worked, territorially? There are 633 reserves in this country, all within provinces and territories, like raisins in a cake. What would their status become? This remained vague. But what if we adopted the Russian system, making them all small ethnic republics within the larger provincial entities created by the settlers who came to this country? After all, Nunavut is already effectively an Inuit polity. So, for example, Kanehsatake, near Montreal, would become a Mohawk republic, within the province of Quebec. The Tsuutʼina First Nation southwest of Calgary would become a self-governing ethnic polity. And so on. Some First Nations are already, in a de facto sense, on this road. British Columbia is home to 198 First Nations, about one-third of all in Canada. The Nisga’a in 1998 signed a treaty with Canada, and as part of the settlement, nearly 2,000 square kilometres in the Nass River Valley in northwestern British Columbia was officially recognized as theirs. The Wetʼsuwetʼen, in the central interior of the province, last May signed an agreement with the federal and provincial governments, in which Ottawa and B.C. recognized Wet’suwet’en rights and title to their land. Doing the same with other Indigenous nations would make for a more complex federal system than the one we have now, but it might open up all sorts of possibilities for further reconciliation. Henry Srebrnik is a professor of political science at the University of Prince Edward Island.
<urn:uuid:97a296fa-6f67-4347-b9b5-d3b40b332179>
CC-MAIN-2023-50
https://www.saltwire.com//atlantic-canada/opinion/regional-perspectives/opinion-can-russia-teach-us-anything-about-ethnically-based-federalism-100571615/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.967301
1,041
3.5
4
SCIE Research briefing 10: Terminal care in care homes Published August 2004 Updated September 2005 Introduction - What is the issue? A SCIE Research briefing provides up-to-date information on a particular topic. It is a concise document summarising the knowledge base in a particular area and is intended to act as a 'launch pad’ or signpost to more in-depth material. The briefing is divided into the different types of knowledge relevant to health and social care research and practice, as defined by the Social Care Institute for Excellence (SCIE). The topic of this briefing is the provision of care to terminally-ill older people aged 65 and over within care homes (personal care and nursing). The terminal care described here encompasses the principles of palliative care. Terminal care is defined as "the management of patients with active and progressive disease for which curative treatment is not possible or not appropriate and from which death can reasonably be expected" within a timeframe of days or months. The palliative care approach requires "... the active holistic care of patients with advanced, progressive illness. Management of pain and other symptoms and provision of psychological, social and spiritual support is paramount. The goal of palliative care is the achievement of best quality of life for patients and their families". Palliative care is considered to be applicable to all diseases, not just cancer. The majority of care homes are personal or residential, and the majority of these are private. Most terminal care within care homes is provided by generalist care staff; specialist palliative care staff only become involved in certain circumstances. - More than half a million older people aged 65 or over live in care homes (nursing and personal care) and substantial numbers end their lives in these care settings. The provision of appropriate terminal care is recognised to make the process of dying more comfortable and meaningful for a person and their family - There is a lack of detailed standards governing the provision of terminal care to older people in care homes, especially for conditions other than cancer - The National Council for Hospice and Specialist Palliative Care Services (NCH&SPCS) is the principal source of documents containing practice recommendations - Care homes can only provide appropriate terminal care if barriers to the provision of care are addressed - Adequate and appropriate terminal care requires the following: care home staff trained in palliative care; regular access to supporting specialist palliative care staff; resources to support the provision of such care; clear and comprehensive plans of care reaching beyond the management of symptoms alone; training in how to communicate effectively with residents and their families about death and dying - Research into factors determining transfer from homes to hospital at end of life, or the appropriateness of such transfers, is lacking - Residents of care homes tend to be very conscious of the probability that they will end their life within the home and are very appreciative of efforts to manage death with discretion within these settings. Specialist terminal care and support, including bereavement support, is highly valued by the terminally ill and their families
<urn:uuid:2f3bb9c4-a764-441d-bd9d-cd285a9254dc>
CC-MAIN-2023-50
https://www.scie.org.uk/publications/briefings/briefing10/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.944849
621
2.515625
3
Too much television, video games and Internet can increase body fat in teens. A five-year study from the University of Montreal and the Sainte-Justine Hospital Research Center, published in the American Journal of Epidemiology, has found teenagers have four different patterns of screen use: increasers, decreasers, consistently high and consistently low users. Even teens from the consistently low group exceeded two hours per day of screen time on average, yet organizations such as the American Academy of Pediatrics and the Canadian Paediatric Society recommend limiting screen use to two hours per day. Increasers and consistently high screen users had the greatest increases in percent body fat, while decreasers had the lowest gains in percent body fat While the majority of adolescents in the study maintained a typical ''flat'' pattern of 25 to 30 hours of screen time per week, close to 30 percent of adolescents had screen time patterns that increased, decreased or remained high over time. The scientists found that these atypical' patterns had the greatest impact on weight gain. "There is some concern that adolescents' television, video and computer use is filling much of their discretionary time" says lead author Tracie A. Barnett, a professor at the Université de Montréal's Department of Social and Preventive Medicine and a scientist at the Sainte-Justine Hospital Research Center. "Our findings show that youth are at greater risk of increased body fat if screen use increases through high school; one possible reason is that teens who increase their screen time are simultaneously reducing involvement in and opportunities for more active pursuits." Similarly, teens that had initially high levels of screen use but dropped their screen use over time ended up with the most favourable body fat profiles. Dr. Barnett and her team evaluated 744 participants, as of grade 7, from 10 Montreal high schools. Teens reported screen time and their level of physical activity four times per year or a total of 20 times during the five-year study. The research team also measured height, weight and body fat of participants several times over the course of the investigation. "The high levels of screen time observed in our study underscore the need for public health strategies to reduce overall screen time among youth. Encouraging less screen time, and some form of monitoring to prevent excessive increases in screen time through high school, would be beneficial to teenagers. Since most already have firmly established viewing habits at the start of high school, these strategies also need to target kids before they even begin high school," says Dr. Barnett. The study was funded by the Canadian Cancer Society, the Fonds de la Recherche en Santé du Québec and the Canadian Institutes of Health Research. Cite This Page:
<urn:uuid:bb9e98f2-1d74-4f40-b49a-fc9605b149a3>
CC-MAIN-2023-50
https://www.sciencedaily.com/releases/2010/09/100920123552.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.948599
548
3.40625
3
Search and compare thousands of words and phrases in American Sign Language (ASL). The largest collection online. How to sign: an approach to psychology that emphasizes observable measurable behavior Your browser does not support HTML5 video. Similiar / Same: behaviorism, behaviourism, behavioristic psychology Categories: experimental psychology, psychonomics Upload your sign now. Add this video to your website by copying the code below.
<urn:uuid:6c560710-ecc9-4f5e-a8e6-89bfd5cfa2e8>
CC-MAIN-2023-50
https://www.signasl.org/sign/behaviouristic-psychology
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.822075
89
2.984375
3
Find out about this prenatal test that checks the fluid surrounding the baby during pregnancy. Amniocentesis is done to remove amniotic fluid and cells from the uterus for testing or treatment. Amniotic fluid surrounds and protects a baby during pregnancy. Amniocentesis can provide useful information about a baby's health. But it's important to know the risks of amniocentesis — and be prepared for the results. Amniocentesis is a test done during pregnancy. During amniocentesis, an ultrasound wand (transducer) is used to show a baby's position in the uterus on a monitor. A sample of amniotic fluid, which contains fetal cells and chemicals produced by the baby, is then taken for testing. Amniocentesis can be done for a number of reasons: Genetic amniocentesis can provide information about the baby's genes. Generally, genetic amniocentesis is offered when the test results might affect how to manage the pregnancy. Genetic amniocentesis is usually done between weeks 14 and 20 of pregnancy. Amniocentesis done before week 14 of pregnancy might lead to more complications. Reasons to consider genetic amniocentesis include: Amniocentesis carries risks, which occur in approximately 1 in 900 tests. They include: Remember, genetic amniocentesis is usually offered to pregnant people for whom the test results might greatly affect how they manage the pregnancy. The decision to have genetic amniocentesis is yours. Your health care provider or genetic counselor can give you information to help you decide. Your health care provider will explain the procedure and ask you to sign a consent form. Consider asking someone to accompany you to the appointment for emotional support or to drive you home afterward. Amniocentesis is usually done in an outpatient obstetric center or a health care provider's office. First, a health care provider will use ultrasound to pinpoint where the baby is in the uterus. You'll lie on your back on an exam table with your belly showing. Your health care provider will apply a gel to your belly and then use a small device known as an ultrasound transducer to show your baby's position on a monitor. Next, your health care provider will clean your abdomen. A numbing medication generally isn't used. Most people report only mild soreness during the procedure. Guided by ultrasound, your health care provider will insert a thin, hollow needle through your stomach wall and into the uterus. A small amount of amniotic fluid is drawn into a syringe. The needle is then removed. You need to lie still while the needle is put in and the amniotic fluid is taken out. You might feel a sting when the needle enters your skin. You might feel cramping when the needle enters your uterus. After amniocentesis, your health care provider will continue using the ultrasound to monitor your baby's heart rate. You might have cramping or mild pelvic pain after an amniocentesis. You can return to your regular activities after the test. The sample of amniotic fluid will be looked at in a lab. Some results might be available within a few days. Other results might take several weeks. Contact your health care provider if you have: Your health care provider or a genetic counselor will help you understand your amniocentesis results. For genetic amniocentesis, test results can rule out or diagnose some genetic conditions, such as Down syndrome. Amniocentesis can't identify all genetic conditions and birth defects. If amniocentesis suggests that your baby has a genetic or chromosomal condition that can't be treated, you might face hard decisions. Seek support from your health care team and your loved ones.
<urn:uuid:93746734-0c8a-467a-b00c-e67e22d218ff>
CC-MAIN-2023-50
https://www.stclair.org/services/mayo-clinic-health-information/tests-and-procedures/PRC-20392900/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.92936
773
3.296875
3
Exploratory testing operates fluidly in real time. But that doesn't mean the process has to be random or scattered. The use of heuristics and mnemonics can serve as a road map to follow as you dive into the exploratory process. In this column, James Bach shares the mnemonic he relies on most for testing and how you can use it to make sure you're covering all the bases. In exploratory testing, we design and execute tests in real time. But how do we organize our minds so that we think of worthwhile tests? One way is through the use of heuristics and mnemonics. A heuristic is "a rule of thumb, simplification, or educated guess." For example, the idea of looking under a welcome mat to find a key is a heuristic. A mnemonic, by contrast, is a "word, rhyme, or other memory aid used to associate a complex or lengthy set of information with something that is simple and easy to remember." Heuristics and mnemonics go together very well to help us solve problems under pressure. SFDPO Spells Testing A mnemonic and heuristic I use a lot in testing is "San Francisco Depot," or SFDPO. These letters stand for Structure, Function, Data, Platform, and Operations. Each word represents a different aspect of a software product. By thinking of the product from each of those points of view, I think of many interesting tests. So, when I'm asked to test something I haven't seen before, I say "San Francisco Depot" to myself, recite each of the five product element categories and begin thinking of what I will test. Structure (what the product is): What files does it have? Do I know anything about how it was built? Is it one program or many? What physical material comes with it? Can I test it module by module? Function (what the product does): What are its functions? What kind of error handling does it do? What kind of user interface does it have? Does it do anything that is not visible to the user? How does it interface with the operating system? Data (what it processes): What kinds of input does it process? What does its output look like? What kinds of modes or states can it be in? Does it come packaged with preset data? Is any of its input sensitive to timing or sequencing? Platform (what it depends upon): What operating systems does it run on? Does the environment have to be configured in any special way? Does it depend on third-party components? Operations (how it will be used): Who will use it? Where and how will they use it? What will they use it for? Are there certain things that users are more likely to do? Is there user data we could get to help make the tests more realistic? Bringing Ideas to Light I can get ideas about any product more quickly by using little tricks like SFDPO. But it isn't just speed I like, it's reliability. Before I discovered SFDPO, I could think of a lot of ideas for tests, but I felt those ideas were random and scattered. I had no way of assessing the completeness of my analysis. Now that I have memorized these heuristics and mnemonics, I know that I still may forget to test something, but at least I have systematically visited the major aspects of the product. I now have heuristics for everything from test techniques to quality criteria. Just because you know something doesn't mean you'll remember it when the need arises. SFDPO is not a template or a test plan, it's just a way to bring important ideas into your conscious mind while you're testing. It's part of your intellectual toolkit. The key thing if you want to become an excellent and reliable exploratory tester is to begin collecting and creating an inventory of heuristics that work for you. Meanwhile, remember that there is no wisdom in heuristics. The wisdom is in you. Heuristics wake you up to ideas, like a sort of cognitive alarm clock, but can't tell you for sure what the right course of action is here and now. That's where skill and experience come in. Good testing is a subtle craft. You should have good tools for the job.
<urn:uuid:db6ead21-fb8a-4d10-83c6-e1321cf1bbe9>
CC-MAIN-2023-50
https://www.stickyminds.com/article/how-do-you-spell-testing
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.959381
898
3
3
Advances in automation and technology are revolutionizing the modern medical world. It is estimated that AI applications can cut annual US healthcare costs by USD 150 billion by 2026. Cutting costs, improving diagnostics, and monitoring patient health are just a few ways that new technology is making healthcare easier and more accessible. But what does this mean for manufacturers in the medical field? In this article, we explore how recent innovations in machine learning and medical automation equipment are having remarkable effects on the general medical industry, and what that might mean for the future of medical manufacturing. What is Machine Learning? Machine learning refers to artificial intelligence that uses data and algorithms to gradually increase its accuracy. Exposed to large amounts of data over time, it appears like these AI are “learning” much as a human would. In reality, their algorithms allow them to sort information and come to clearer conclusions the more data they process. Anomaly detection is a great application of machine learning in healthcare. Incorporating millions of medical data points, AI will soon be able to detect symptoms outside common patterns, allowing doctors to correctly diagnose patients and arrive at proper plans of treatment with fewer errors. Impactful Advances in Automated Medical Technology There have been a multitude of impactful technological advances in the fields of data science and artificial intelligence in recent years (including machine learning), and these automated systems offer exciting opportunities for improvement in the medical industry. As we mentioned above, machine learning has led to critical advancements for medical diagnostics. Diagnostic errors currently account for 40,000-80,000 U.S. deaths annually. Automated systems and AI have the ability to decrease diagnostic errors and save lives. More correct diagnoses will also save doctors and diagnosticians significant amounts of time which can be reallocated to patient care and recovery. Machine learning is also used in generative design — an explorative and iterative design process that can quickly and accurately generate multiple creative solutions. Combined with advances in 3D printing and additive manufacturing, generative design can create mathematically optimal topography that can be easily and accurately produced. These technologies create the possibility for cost-effective and custom-automated medical device and orthosis assembly. Automated systems also allow for increased patient monitoring. Medicine becomes more accessible when patients’ vitals can be supervised at home and remotely delivered to their medical professionals, improving frail elderly people’s health care outcomes. Personal monitoring by artificially intelligent medical devices also has great potential for the advanced detection of medical issues. A Healthcare Revolution All these innovations are changing the landscape of what seems possible in the medical industry. Customer care and manufacturing processes are becoming more efficient and accurate through the use of automated solutions and artificial intelligence. Automation creates consistency and the potential to offer high-quality care free of bias and human error. In the medical field, these upgrades can save lives and aid doctors in making well-informed decisions. From the optimal design of manufactured medical equipment to using AI as a diagnostic, surgical, and accessibility aid, automation is improving the healthcare system daily. In addition to machine learning for diagnostics, pharmaceutical and medical automation equipment is the cutting-edge technology poised to revolutionize healthcare. Summit Engineered Automation equipment is designed and customized with each individual project in mind. Offering innovative solutions to common production problems, Summit has the engineering expertise to make your automation goals efficient and effective realities.
<urn:uuid:a70fe952-c07e-4cfc-b5cb-6270ebaf4964>
CC-MAIN-2023-50
https://www.summitengineeredautomation.com/advances-in-medical-automation-equipment/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.947247
694
3.15625
3
Here are some frequently asked questions our staff gets asked: Q: Resources: “Where can I find authentic Aboriginal resources? Where do I find books on specific Nations, customs? Is there a place to find books on the topics I am covering?” A: Surrey has an Aboriginal Resource Centre (ARC) bit.ly/SD36ARC with an online catalog you can browse. Materials can be borrowed by emailing Cathy Norton and they will be sent to your school via courier. Your own school library also has Aboriginal resources that have been purchased by your teacher-librarian or by the district. The District Cultural Facilitators can also provide some background when they present on topics in schools. A number of FNMI publishers and distributors such as Strong Nations offer authentic materials for purchase. Q: Terms and definitions: “I am not sure what terms I should use when talking about various communities and members. Is it First Nations, First Peoples, Aboriginal?” A: The term “Aboriginal” is the umbrella word that all members of the various communities can stand under. Aboriginal includes First Nations + Métis + Inuit. (Synonyms for Aboriginal include the terms “Indigenous”, and “First Peoples” and the acronym FNMI. While it is becoming more common to see the term "Indigenous" being used in the place of "Aboriginal", both are still accepted. It should be noted that that "Indigenous" will likely become the more standard designation in the near future.) The term First Nations can also be used to refer to a specific band. UBC has a helpful terminology page, as does Indigenous and Northern Affairs. In Surrey, students with the designation “Aboriginal” could belong to a local band, be a member of a First Nation elsewhere in the province or country, have Métis background or identify with their indigenous heritage without having band membership. A note regarding word origins: the term "Indigenous" is from Latin via French, meaning "born within a place", indu (prep.) "in, within" + gignere (v) "to beget". The term "Aboriginal" is from the Latin name for the original peoples of Latium (Aborigines), from the Latin phrase "ab origine" which means "from the beginning", ab (prep.) "from" + origine (n.) "origin, beginning". "Métis" is from the French noun "métissage" via Latin "mixticius" meaning "weaving from different fibers." The noun "Inuit" is from the Inuktitut language and means "the people". The singular form is Inuk. The adjectival form is Inuit. Q: Duties of Enhancement workers: “What is your job? Is an AEA the same as an ACYCW? What services do you provide?” A: Aboriginal Enhancement worker is the general term that describes the various staff we have working in schools. AEAs are Aboriginal Education Assistants whose job is to provide enhanced academic support. ACYCWs are Aboriginal Child and Youth Care Workers who provide Social-Emotional Learning support. (They will connect with families and advocate for students under their care.) This work is not meant to replace the regular services that all Surrey students are entitled to. The funding we receive is intended to provide an enhancement to existing services and programs. Q: Allocation of staff: “Why does staffing vary from year to year? How are service levels determined? Why do you work at so many schools?” A: Staffing is based on numbers of Aboriginal students in a school for each year, and on perceived demographic needs. Our total FTE is generated by the funding we receive. Schools with very few Aboriginal students will be assigned fewer days of support. Every attempt is made to group staff together around geographically close buildings to create “Family of Schools” teams. Schools with very low numbers of Aboriginal Learners are grouped together and supported by the Low Number Support Team. Support for LNST schools is more episodic and may include ISPARC activities, Healthy Living and Eating programs, or other events. Q: Aboriginal background: “Are all Aboriginal Enhancement workers Aboriginal themselves?” A: We endeavour to hire Aboriginal people into Enhancement workers into positions themselves, so many of our staff have indigenous backgrounds. They may be Métis, or from local First Nations, or may be far from their traditional communities. Some staff have mixed heritage but are proud to connect to their aboriginal background. Q: Cultural Presentations - “First Peoples in Residence” Week: “How do I book cultural presentations? What is the limit on bookings? Where do I find the presentation topics? How do I know my booking is confirmed?” A: Cultural presentations are delivered by our District Cultural Facilitators. These staff members are hired because of their knowledge of particular traditional teachings and practices, and share them with schools. Schools can book what we are calling a "First Peoples in Residence" week. We are asking schools to pull together a committee of interested teachers to organize the event. Once you've picked a week, and thought about a suggested theme or grade level, we will send you a team of 2, 3, or 4 cultural presenters depending on school size. Your week would begin with an assembly Monday morning to introduce the presenters to the student body. There would also be a meet-and-greet lunch for your staff to meet the presenters in a more informal setting. Presentations would then be made throughout the week in classes determined by the school committee (you may, for example, wish to target K-1s or grade 7s, etc.). Divisions not covered in presentations would do their own Aboriginal focused activities (music, art, story, video, etc.) The week ends with an assembly on Friday morning thanking the presenters, giving selected students to share what they learned during the week. Schools may also choose to invite additional presenters (i.e. dancers, singers, storyteller, etc.) to supplement the work of our cultural workers. Once your school has chosen a week, you will email the registration form to Paula James, and we'll do our best to book you in as close to your choice as possible. Q: Indian Residential Schools: “This is a difficult topic to address, especially with young children. What should I cover?” A: Although this can be a challenging subject, it is part of the curriculum. Teaching about this terrible time in Canadian history is part of acknowledging the truth about policies and practices that have harmed Aboriginal peoples, culture and communities. There are many books, web-based resources and downloadables that will help, along with support from the Aboriginal Helping Teachers. Every year, Orange Shirt Day allows schools to introduce this topic in age-appropriate ways. Q: Aboriginal Identification: “How does a parent identify their child as an Aboriginal student? What criteria are used? Why is this important?” A: The province provides funding to the district so we can deliver enhanced education programs and services for Aboriginal students. At registration, parents are given an opportunity to self identify as being of Aboriginal ancestry. In addition to self-identification, parents can opt in (or out) of receiving services from Aboriginal Education. From year to year, Surrey typically has in the neighbourhood of 3200 students with Aboriginal background. Q: Teaching Aboriginal content: “Who can I call on to help me deliver content in my classroom?” A: Because it is part of the provincial curriculum, all teachers are entrusted with teaching Aboriginal content and perspectives in schools. Teachers are supported by our 3 Aboriginal Helping Teachers (two Elementary, one Secondary) who provide workshops, work with individual teachers and offer email support. District Cultural Facilitators can be booked as part of the “First Peoples in residence” program. While your AEA or ACYCW may have individual expertise to share, this is not part of their job expectations. Q: Orange Shirt Day: What is Orange Shirt Day? Is every school doing it? What can I do with my students or at my school? A: Orange Shirt Day was created during the St. Joseph Mission Residential School Commemoration Project in Williams Lake, BC, in May 2013. As a way of helping to educate our students and communities on the history of Canadian Residential Schools. Teachers are encouraged to embrace and explore this topic within their classroom leading up to September 30th, and use the colour orange as a way of bringing attention to this issue. Our district has had very good participation, and most schools are making it a “calendar event” for September. Activities and suggestions can be found here. Q: BC First Nations: “How do I know where the various BC First Nations are located? How many Nations are in the Lower Mainland? Why have the names of some BC First Nations changed?” A: British Columbia is home to many First Nations as well as Métis. There are 198 distinct First Nations and over 30 languages spoken (60 dialects.)* The Ministry of Education has a map that shows traditional territories along with the current naming conventions and a pronunciation guide. In some cases, Nations were named using English names or mispronunciations of Native words. (Profile of Metro Vancouver First Nations.) Q: Acknowledging Territory: “What does acknowledging territory mean? Why do we do this? When should I acknowledge territory? Is this the same as welcoming? Does an elder need to do this?” A: Acknowledging Coast Salish traditional territory respects the ethical principle of promise-keeping and recognizes that we are meeting on land that is still inhabited by living traditional cultures. The Canadian constitution and the treaty-making promises to respect First Peoples, rights to languages and cultures. We suggest the following wording in official gatherings: “We would like to acknowledge the shared unceded traditional territory of the Katzie, Semiahmoo, Kwantlen and other Coast Salish Peoples on which we work, play and learn.” “We would like to acknowledge that our school, where we work, play and learn, is on the shared unceded traditional territory of the Katzie, Semiahmoo, Kwantlen and other Coast Salish Peoples.” Q: Cultural Appropriation: “What is cultural appropriation? Why do many indigenous people object to being portrayed in Halloween costume?” Why is there a reaction to such teams as the Washington football team or the Cleveland baseball team? What is the concern about logos or mascots? A: Particularly at Halloween, the conversation often turns to the question of appropriate costumes, which includes issues of cultural appropriation and misrepresentation. This is especially true of “Aboriginal costumes.” Typically, these costumes take elements from various Nations (i.e. Native designs or symbols, head dresses, medicine bags, etc.) and weave them together in a mishmash meant to be “Indian.” However, regalia has specific and often spiritual significance. Wearing it in a haphazard or inappropriate way trivializes its meaning. In addition, because Indigenous culture has a history of being eroded and repressed in mainstream society, treating identity as a “costume” is simply another form of that erosion. Just as wearing a grab-bag of liturgical vestments from a variety of religions would be seen bad taste, so too is wearing an “Aboriginal” costume. For more reading on cultural appropriation, visit this link. Q: Who can teach what? “What about teaching students how to weave, make dreamcatchers, do beading, etc. Are we able to teach the kids about First Nation art? (ie. making dream catchers or other items.) Are we allowed to “tell stories regarding First Nation communities, nature or teaching stories?” A: Here are some basic principles that may help: “It’s in the curriculum” Aboriginal worldviews and content are part of the redesigned curriculum, at all levels and in all subjects. So it is a given that educators will be sharing Indigenous material and perspectives. Teaching this content is a shared responsibility. “Culture, not crafts” Teaching what some would call “crafts” (ie weaving, beading, dream catchers, etc.) can be a perfectly appropriate activity when embedded into meaningful learning outcomes that emphasize cultural tradition. For example, we could teach about the Anishinaabe people and then look at the dream catchers as cultural artifacts; talking about their purpose respects cultural origins and gives a context to the item. Likewise, beading takes many forms depending on which Aboriginal tradition, designs, styles and stitches we want to explore. As with the dreamcatcher, this is a great opportunity to talk about a variety of cultures and emphasizes the importance of embedding this in a particular nation’s culture. Weaving (whether it be wool or roots or cedar) is another such example.The key idea is to see these activities not as crafts to be done in isolation, but as part of coming to greater understanding of a particular First Nation. “Sharing stories is what we do” Recounting or narrating published stories is not a problem. If we are reasonably certain of the provenance of the material (ie. do we know the Nation? Are the stories authentic?) then teachers can feel confident reading these to students. We do want to give context to the material, but sharing these with students is part of what we do as teachers. While there are some stories that are “family property” and aren't for sharing, generally speaking these are not the ones being published and sold today, and then recommended by FNESC, ERAC and vendors such as Strong Nations and Good Minds. There are many beautiful picture books that let educators share both ancient and modern stories that spring from the many Nations in BC and beyond. Look in your school library for recently published, attractively presented stories and share these treasures with your classes. Q: What is the Windspeaker Youth Leadership Program? A: The purpose of Windspeaker is to provide Aboriginal learners with outdoor and placed-base experiences. Students develop relationships with each other, their community and themselves, and learn more about the traditional territories on which these experiences take place. It provides opportunities for students to develop interpersonal, cultural and social skills that harness their strengths and builds on their potential. Typically, the activities are field trips that happen during the school day, once a month and supervised by ACYCWs. For more information on this program, please contact the department..
<urn:uuid:4ce68bba-de37-4982-9bf6-7131702b9355>
CC-MAIN-2023-50
https://www.surreyschools.ca/page/1083/faq
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.957658
3,076
3.015625
3
If you want to survive a natural disaster, you’ll need to beat the odds that offers at least a 50/50 chance to live. Sometimes you are just at the wrong place at the wrong time when an emergency is encountered. It might be an earthquake, flood, winter storm, typhoon, and such. In recent times we’ve seen floods in Colorado, wildfires in California, tornadoes in Oklahoma, hurricanes in Puerto Rico and Florida, and snowstorms in various parts of the country. There really is no way to prevent a natural disaster from occurring, but that doesn’t mean you have to be left helpless. The number of people who are unprepared and unaware of what to do during these disasters is alarmingly high. Here are some tips and survival strategies to help you be more prepared for the next disaster: 1. Stay calm Natural disasters can happen anytime and anywhere and this can commonly result to panic particularly during a very stressful situation. Staying calm and thinking of a better plan is perhaps one of the most important survival strategies. Unpreparedness is the number one reason why most people become tense and panicky, but this can only end badly, resulting in serious injuries or even getting killed. Think calmly while applying each and every basic survival strategy learned in the past to be able to survive. 2. Protect yourself at all times Natural disasters are not the only enemy during emergencies. Opportunistic individuals are also considered as a threat because they take advantage of the disaster. These people may steal your valuables or even do things that can harm your life. It is important to be prepared at all times by protecting yourself from all the factors that can cause danger during disasters. Seek higher or safer grounds Sometimes a natural disaster calls for you to look for a safe and secure area to hide or stay until rescue arrives. For example, when dealing with an earthquake, it is important to consider staying under a solid and stable table or object that can protect you from falling debris. For floods on the other hand, try to stay on high grounds whether it is on the second floor or roof top and wait to be rescued. Aside from a safe location, other measures must also be prepared including preparing necessities such as food, water and first aid materials. Find a Way to Signal Rescue Communication is very important especially during a natural disaster. However, there is usually increased difficulty of communication during this time which might take weeks or longer if communication lines are down. Thus, how can you signal for help? If you are trapped in a building because of an earthquake, try to make a noise by hitting a metallic object to signal for help. The vibration of the sound may reach the top surface and be heard by the rescuer. These rescuers are always alert when it comes to sounds as they use this method to find any victims of the disaster. If you are surrounded by flood and are on the rooftop, try to wave your arms at any flying aircraft for help. Natural disasters can cause the death to thousands of people, so you’ll want to increase your odds of survival with as many survival strategies as you can muster. If you live in an area prone to natural disaster, you should learn some simple strategies for dealing with the kind of disaster most likely to occur in that area.
<urn:uuid:50e2e7c6-7604-44cc-baf7-6da269443e10>
CC-MAIN-2023-50
https://www.survivalfoodreserves.com/preparedness/do-you-know-these-survival-strategies-for-disasters
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.963779
675
2.84375
3
Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, under some situations the crime may be serious enough to get you prosecuted in several jurisdictions in different states, countries, or even countries due to the highly distributed nature of the internet. Of course, prosecution of a crime can also be difficult considering the web of various legal systems in play. A mix of common, military, and civil exists, requiring knowledge of a given legal system to be successful in any more toward prosecution. As an ethical hacker you must also obey the Code of Ethics as defined by the EC-Council. One thing to remember though about ethics is that while you can get in legal trouble for violating a law, breaking a code of ethics won’t get you in legal trouble but could lead to other actions such as getting decertified. NOTE: – Depending on when and where your testing takes place, it is even possible for you to break religious law. Although you may never encounter this problem, it is something that you should be aware of—you never know what type of laws you may break. Always ensure that you exercise the utmost care and concern to ensure that you observe proper safety and avoid legal issues. When your client has determined their goals along with your input, together you must put the contract in place. Remember the following points when developing a contract and establishing guidelines: Trust The client is placing trust in you to use proper discretion when performing a penetration test. If you break this trust, it can lead to the questioning of other details such as the results of the test. Legal Implications Breaking a limit placed on a test may be sufficient cause for your client to take legal action against you. The following is a summary of laws, regulations, and directives that you should have a basic knowledge of: - 1973-U.S. Code of Fairs Information Practices governs the maintenance and storage of personal information by data systems such as health and credit bureaus. - 1974-U.S. Privacy Act governs the handling of personal information by the U.S. government. - 1984-U.S. Medical Computer Crime Act addresses illegally accessing or altering medication data. - 1986 (amended in 1996)-U.S. Computer Fraud and Abuse Act includes issues such as altering, damaging, or destroying information in a federal computer and trafficking in computer passwords if it affects interstate or foreign commerce or permits unauthorized access to government computers. - 1986-U.S. Electronic Communications Privacy Act prohibits eavesdropping or the interception of message contents without distinguishing between private or public communications carrier to make wiretaps possible. - 1996-U.S. Kennedy-Kassebaum Health Insurance and Portability Accountability Act (HIPAA) (with additional requirements added in December 2000) addresses the issues of personal healthcare information privacy and health plan portability in the United States. - 1996-U.S. National Information Infrastructure Protection Act was enacted in October 1996 as part of Public Law 104-294; it amended the Computer Fraud and Abuse Act, which is codified in 18 U.S.C. $ 1030. This act addresses the protection of the confidentiality, integrity, and availability of data and systems. This act is intended to encourage other countries to adopt a similar framework, thus creating a more uniform approach to addressing computer crime in the existing global information infrastructure. - 2002-Sarbanes-Oxley Act (SOX or SarBox) is a law pertaining to accountability for public companies relating to financial information. - 2002-Federal Information Security Management Act (FISMA) is a law designed to protect the security of information stored or managed by government systems at the federal level. ALL THE INFORMATION PROVIDED HERE IN WWW.techietalks.online WEBSITE IS 100% ONLY FOR EDUCATIONAL AND AWARENESS PURSPOSES THERE IS NO ACT OF HARMING OR DAMAGING ANYONE OR ANYTHING. ( WWW.SYBEX.COM )
<urn:uuid:cf3d4857-c626-47f0-8bfa-33ed69914784>
CC-MAIN-2023-50
https://www.techietalks.online/ethics-and-the-law/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00800.warc.gz
en
0.918246
864
2.734375
3